Operating Online Flashcards
(33 cards)
What is the Internet?
A huge network that links networks of computers all over the world
All computers use the same protocol to communicate and send data to each other
What do you need in order to connect to the internet?
You need a Network Interface Card (NIC) to get a cable or wifi connection
You need to sign up with an Internet Service Provider (ISP)
What should you consider when choosing an ISP?
Monthly payments as well as set-up cost
Bandwidth: Higher bandwidth usually means a higher price. Note that the maximum bandwidth stated in ads are never reached due to other network traffic
Download limits: You can be charged extra if you go over the cap
Email and Web space: Most ISPs can provide you email addresses and provide space on their servers for you to create your own website
Security: ISP may provide you a firewall, antivirus and antispam software, and parental controls
Reliability and support: ISPs may lie about bandwidth and may have poor customer care. Check for reviews.
Ways of communicating over the internet
Email: Sending msgs. Can be accessed on most digital devices
Instant Messaging: Real time “talking” through typing messages. Helps collaboration
Blogs: Shared online diaries where you can post and share experiences.
Social Networking: Websites that allow chat, messaging, email, group and file sharing.
Voice over Internet Protocol (VoIP): Requires fast internet connection. Can add webcam to video chat
Online Albums: Photo albums hosted on a website. Allows the backing up and sharing of photos
Name three different ways businesses use when communicating over the internet
Email, IM, VoIP
+Aid collaboration
-Possibility of over-reliance or misuse
Why is cloud computing useful for businesses?
It allows software and data to be stored centrally so it can be accessed from anywhere.
+Don’t need to buy multiple software licenses
-Possible security issues with data stored by third party
Why is video conferencing useful for businesses?
Two-way audio and video transmissions.
+Reduces need for travel so lowers costs
-People do not communicate as well as when face to face
What is a VLE?
A web-based system allowing students, parents and teachers to communicate in a “virtual school”
+Students can access tasks and resources uploaded by teachers and track progress
-Cannot access if you don’t have an internet connection
What are user-generated websites?
Websites to which people can add their own content.
+up to date information which draws on lots of people’s knowledge and expertise
-Anyone can add content so it may be biased and inaccurate
How are news websites useful for learning on the internet?
+Can use RSS feeds to see latest stories
+Can search archives to find old stories
-Possible over reliance on news websites than using a number of resources for research
List things you can do to keep your passwords secure
Do not write it down
Change it regularly
Do not tell anyone your password
Avoid allowing browsers to remember password on shared/public PCs
Encrypt passwords
Use different passwords for different sites
State two challenge response tests you may encounter when setting up an account and explain how they work
Security questions: You are usually asked to select a security question and enter your secret answer when you first set up an account. Banks require you to answer security questions as well as entering your password. It can be used to identify you if you forget your password.
Captcha: Have to enter the letters and numbers shown in the box. Used to check the form is not being automatically completed by a bot. Used to protect systems vulnerable to email spam
Ways in which you can personalise your online space
Add photos Personal info Text and weblinks Likes and dislikes News feeds
How can you control who can access your personal space?
Make online albums private
Don’t befriend everyone who sends a friend request on social networking sites
Check and use your privacy settings on all social networking sites
Name 5 things you should keep in mind when you have a personal presence on the internet
Don’t post anything you don’t want to be made public
Minimise details that identify you or your whereabouts
Keep your account numbers, usernames and passwords secret
Only share your screen names with people you know
Don’t use apps that use GPS on your phone to share your location with people you don’t know
What is OVERT data collection?
You know that this information is being collected.
Reputable companies will keep your data secure, wont share it with other companies and will ask you to opt in to marketing emails than to opt out.
What is COVERT data collection?
You don’t know that this information is being collected.
This usually refers to the way spyware works.
What are Trojans?
Spyware that hackers can install to spy on your computer.
They record all your key strokes or take pictures of the screen
They can find out your personal and financial info as you enter it and use it to commit fraud.
State what a cookie is and what it does
Cookies are small text files sent to your computer by most websites when you visit them.
Stored on your computer and used to track what you do on the website
They can monitor what you look at and suggest things you might like.
Some sites may allow third party cookies from marketing companies. They sell the information they find out about you.
How can you check to make sure a site is secure?
https at beginning of address
Padlock symbol
Green web address bar
What is identity theft?
When fraudsters find out peoples personal details and use them to make money by pretending to be that person.
They can open bank account and apply for loans, credit cards, passports and driving licenses under someone else’s name
How can you control your cookies?
Set your browsers to accept or reject all or some cookies
Set your browser to prompt them each time a cookie is offered (hahaha would you reject a cookie? cx)
All browsers also have the option to delete all the cookies on your computer
What is a privacy policy and what purpose does it serve?
Privacy policies in line with the Data Protection Act are used by websites in prominent places to describe the website’s use of cookies and other trackers. It tells you what info will be gathered and how it will be stored and used.
How can you spot phishing emails?
Impersonal greeting Threat URL that appears to be from bank but does not take you to bank website when clicked Request for your personal info Bad grammar and spelling Faraway location included in email