operating online Flashcards

1
Q

Define internet?

A

A huge network that links networks of computers all over the world. All the computers use the same protocol. They communicate and send data to each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

communicate and send data to each other.

What is the most widely use internet service?

A

The world wide web www which uses the HTTP protocol to allows users to access the interlinked hypertext documents we call a web page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do you need to connect to the internet?

A

A network interface card NIC this allows you to get a cable or Wi-Fi connection. You also need to sign up with an internet service provider ISP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do you have to consider when selecting an ISP?

A

Cost, bandwidth, download limit, email/web space, security, reliability/support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What the cost of a isp?

A

It charges monthly and a set up cost too

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the bandwidth of an ISP?

A

Varies, usually the higher then bandwidth the higher the cost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the download limit on an ISP?

A

Some impose a limit per month and charge extra if you go over.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is the email and web space like on an ISP?

A

most will provide an email adress and prvide spce on their servers for your own websie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

whats the security like on an ISP?

A

broadband, always on, connections vunerable to hackers. the isp should provide you with a firewall, antivirus, antispam and parent controlls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

whats the relability and supprt like with an ISP?

A

some never provide the bandwidth they promise and have poor customer care. you can chack this in magazines, forums and user goups online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

how is email used for internet communication?

A

sending messages\can access usin glaptiops, phones and tablets ect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

how is Im used for internet communication?

A

talking real time by typing messages

helps collaboration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

how are blogs used for internet communication?

A

share online diaries, experiences

twitter is a microblog(post 140 characters)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

how are social netwroks used for internet communication?

A

websites allow chat, ,messaging, email and file sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

how might a student/teen use the internet?

A

keep in touch with frineds through email/social netwroks
download/stream music and films
keep up to dat with newn through rss feeds
access schools vle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

why do we need internet privacy? how do we achieve this?

A

you need to protect personal information. you can change settings on social networking sites to restric who can view personal detail, photos and posts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what are email, IM and voIP examples of?

A

ways of communicating over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what are the pros and con of internet communication?

A

:) aids colaboration

:( possibility of over reliance or missuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

whats cloud computing?

A

storing software and data centrally so it can be accessed anywhere

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what are the pros and cons of cloud computing/

A

:)dont need to but multiple software licences

:( possible security issues with data stored by a third party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

whats video confercing?

A

two way audio and video transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what are the pros and cons of video conferencing?

A

:) reduces need to travel

:( people dont communicate as well as face to face

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what a vle/

A

virtual learning environemt, a web bsed system that allow studnets, parents and teacher to communicate in a virual school

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what are the pros and cons of having a vle?

A

:) students can access tasts and resources updated by teacher and track progress
:( cannot acces if you dont have interne connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
what are the pros and cons of news websites?
:) use rss feeds :) can search archives to find old stories :( possible over reliance rather than using a number of sources for research
26
what are the pros and cons of user genrated websites (WIKI)?
:) up to date info which draws on may people knowledge/expertise :( any one can add info, inacurate/bias
27
how can you earn on the inetrnet?
vle news websites user generated websites
28
what are passwords use for on te internet?
to authenicicate
29
what makes a strong password?
6 charcters long mixture of numbers letters and symbols something not reasily recognisedupper and lower case
30
how can you keep a password secure?
dont write it down change it reguarly dont tell anyone dont allow other to watch when typing it in dont allow browsers to remeber passwords on shared pc use a variety for differnet sites encrypt passwords
31
what is a sercurity question?
challenge response test.
32
why do we have security question?
banks require them aswell as passowrds for more security | identify yourself if you forget your password
33
whats a captcha and why do we have them?
to test you are human and not a web robot, they protect systems vunerable to spam
34
give example of personal spaces on the internet?
``` personal websites online photo albums blogs social networking vle social media platforms ```
35
in what ways can you personalise your space online?
``` photos personal informtion text and weblinks likes and dislikes news feeds ```
36
in what ways can you control who has access to your personal spaces/
make online albums prvate dont befriends anyone without checking the first think before you share anything/ info
37
in what ways can socia netwok sits share information about you?
strangers coud view images sites share location via status udates might give away personal info- date of birth
38
what are the 5 rules of personal spaces and privacy?
1. dont post anything you dont want public 2. minimise details about your idnetity/whereabouts 3. keeps usernames/account numbers and passwords secret 4. only share screen names wth people you know 5. dont use apps that use GPS to share your location with people you dont know
39
how can you check your online repuation?
search your first and last name into a serch engine too see what has been posted about you
40
what can you do if you find somethin online about you that you dont want there?
contact the user who posted it and request its taken down or corected
41
what does overt data coection mean?
you know the information is being collected
42
give an example of overt data collection
opening online accounts and paying online
43
tocheck a website is secure for aying what should you check for?
HTTPS | a padlock
44
what is meant by covert data collection?
information collected without you knowig or consent
45
give an example of covert data collection?
spyware and trojans record key strokes and take pictures of yur screen, theytake personal inof and use it to commit fraud
46
whats identity theft?
fraudsters take personal informatin ad use it to make only by pretending to be that perso. they open bank accounts, loans, credit card, passports ect in someone elses name
47
why are cookies helpful?
saves you typing pasword in multiple times website is personalise cusomised recomendations
48
why should cookies be deletes reguarly?
free up space stop unsolicited personalised adverts stops peple getting your info
49
how can controlng cookies help prevet missuse of information?
cookies can track browsing activity and are a mojor privacy concrn
50
how ca you actally controll cookies/
set borwsers to accept or reject cookies | set browser to prompt each time a cookie is offered
51
what should a website that collects information have?
a privacy policie that describes the websites uses of cookies and trackers
52
whats phishing?
emails sent to get information out of people. thier tone is urgent as they wat you to had over info.
53
how can you distingush a phishing email?
impersonal greeting threat URL apprears forma bank but doesnt go there when clicked requests persoanl info
54
how can you prevent spyware
``` use a firewall use antvirus software be wary of downloading popular free music and fie sharing programs be careful use trusted websites read security warnings go off websites your unsure of ```
55
tht two acts help prtect form data misue?
the data protection act 1998 and the computer misuse act
56
what does the data protection act say companies holding data have to do?
``` keep it secure not ask for unnescary data not keep it longer than needed kepp it acurate and up to date not use it fo other purposs without consent ```
57
what are your data protecion rights?
have the right to look at and check any info someone hold of yours, they can charge you to look at it you can demand it be amened if incorrect demand its not used in a way that could harm or diistres you can demand its not used for direct marketing
58
what is unauthorised access to computer material? yellow section of the computer missuse act
this includes logging into annother persons computer with their password without permissin. sealing documents and programs
59
what is unauthorised modification of computer material? organge section of computer missuse act
destorying or corrupting annother users files, modigying system files or creating a virus
60
what is unauthorised acces to a computer with intent? red section of computer missuse act
gaining acces to financial or admin records using the information to commit an crime or fraud
61
what does copyright protect?
the copyright, designs and patents act protects orginal work form being used without permission
62
what counts a orginal work for copyright?
literature, music, films, sound recordings, drama, software, images, art
63
why do we have copyright?
peope spent time and moany writing and recording these materials they deserve to get paid for them if profesional cannot make money form their work then they will not be able to create any more
64
what are the cosequences of illegal file sharing?
prosecution yous ISP may ban you form internet use prison sentence hugh impact on music and film industry
65
what are some examples of copyright infringement?
sharing files over the internet copying and distrubuting files pretending soemone elses work is yours
66
if you want to use someone elses picture onyour website what must you do first?
not use it without permission form the copyright owner as it would be breaching it. ask the owners permission first before you use it