D.I.T computing topic a,b,c,d

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/39

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

40 Terms

1
New cards

What is ad-hoc

A temporary wireless network

2
New cards

What is Cloud Storage

Allows users to store files

3
New cards

What is synchronisation

Always have up - to - date version of your files.

4
New cards

What is availability

24/7 accessibility

5
New cards

What is scalability

You can increase storage based on needs.

6
New cards

What is flexibility

remote working which allows staff to work from home.

7
New cards

What are the impacts of remote working on the company

8
New cards

What are the impacts of remote working on staff

9
New cards

What is malware

A malicious software designed to hack a system

10
New cards

What is phishing

Fake emails and websites to trick people

11
New cards

What is farming

cyber attack intended to redirect a websites traffic to a fake site.

12
New cards

What is social engineering

Manipulating people into giving away details

13
New cards

What is shoulder surfing

Attack can physically view device screen and keyboard to get information.

14
New cards

Man - in - the - middle

A hacker monitors a network in order to get information.

15
New cards

What is physical security

restricting access to important parts of a network.

16
New cards

What Is user access rights

17
New cards

What is a fire wall

Blocks unexpected connections into network

18
New cards

ecryption

Scrambles data so it cannot be read by anyone (An ecyryption key)

19
New cards

Ethical hacking

White hackers are computer experts which hack with permission

20
New cards

Penetration testing

How resilient a network is agains an attack

21
New cards

What is disaster recover policy

steps a company will take in the event of a disaster.

22
New cards

What are the actions after an attack

23
New cards

How are viruses spread

USB , email, download

24
New cards

E-waste

ore-waste in the waste produced from the disposal or electronic devices.

25
New cards

intellectual property

Trade marks , copy right , patents

26
New cards

Copy right

protects peoples creations that are covered by patents.

27
New cards

Trade marks

names or symbols used by company so it can’t be used by others.

28
New cards

Carbon footprints

Total amount of co2

29
New cards

What is the computer misuse act

30
New cards

Lawful processing

Truthful about all data

31
New cards

Running

even more co2 is produced when generating electricity

32
New cards

Disposal

devices are disposed can add landfill and can have a huge impact on the environment.

33
New cards

Mining

Non - renewable resources like copper band gold releases co2 in atmosphere.

34
New cards

Manufacturing

Raw materials need to be refined into factors.

35
New cards

Equality act (2010)

Equality opportunity to all people.

36
New cards

What are some environmental impacts

37
New cards

Acceptable

Things you can do on the system.

38
New cards

unacceptable

Things you can’t do on the system.

39
New cards

Scope

Introduction of who policy is for.

40
New cards

assets

devices/resources it includes.