ch 8 + 10

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/89

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

90 Terms

1
New cards
What is a weak password?
Too short, easy to guess, doesn't contain upper/lower case, numbers or symbols.
2
New cards
What makes a password weak?
Too short, easy to guess, doesn't contain upper/lower case, numbers or symbols.
3
New cards
How can passwords be managed?
Change regularly, use strong passwords, don't share them, don't write them down.
4
New cards
Explain the need for copyright legislation.
Protects intellectual property rights and prevents unauthorized copying.
5
New cards
Why is copyright legislation important?
Protects intellectual property rights and prevents unauthorized copying.
6
New cards
Describe four ways software houses can help prevent copyright infringement.
Use activation keys, encryption, user licenses, watermarking.
7
New cards
Explain what is meant by a virus and how it affects a computer.
Malicious software that disrupts system operations, steals data, or damages files.
8
New cards
What is a computer virus?
Malicious software that disrupts system operations, steals data, or damages files.
9
New cards
Explain how key-logging software works.
Records keystrokes to steal information such as passwords and credit card numbers.
10
New cards
What is key-logging software?
Software that records keystrokes to steal sensitive information.
11
New cards
Discuss the advantages and disadvantages of social networking rather than email as a communication method.
Advantages: Quick, global reach. Disadvantages: Privacy risks, information overload.
12
New cards
Explain what is meant by Secure Socket Layer (SSL).
Protocol for secure communication over the Internet using encryption.
13
New cards
What is SSL (Secure Socket Layer)?
A protocol for secure communication over the Internet using encryption.
14
New cards
Describe the features indicating a secure connection in a browser.
Padlock icon, "https" in URL, digital certificates.
15
New cards
What features in a browser indicate a secure connection?
Padlock icon, "https" in URL, digital certificates.
16
New cards
Explain what is meant by hacking and its effects on data or computers.
Unauthorized access to a computer system that may result in data theft or damage.
17
New cards
What is hacking and how does it affect data?
Unauthorized access to a computer system that may result in data theft or damage.
18
New cards
List signs of a virus infection.
Slow performance, frequent crashes, unknown programs running, pop-up ads.
19
New cards
Describe the processes a web browser uses to load a web page.
DNS lookup, sends HTTP request, receives HTML, renders the page.
20
New cards
What steps does a web browser take to load a web page?
DNS lookup, sends HTTP request, receives HTML, renders the page.
21
New cards
Describe other measures to ensure safe online gaming for young people.
Parental controls, limit playtime, educate about privacy, monitor chat.
22
New cards
What measures ensure safe online gaming for young people?
Parental controls, limit playtime, educate about privacy, monitor chat.
23
New cards
Explain data encryption.
Converting data into a secure format to prevent unauthorized access.
24
New cards
What is data encryption?
Converting data into a secure format to prevent unauthorized access.
25
New cards
Explain a digital certificate.
A digital document that verifies the identity of a website or user.
26
New cards
What is a digital certificate?
A digital document that verifies the identity of a website or user.
27
New cards
Evaluate your computer use in terms of health and strategies for improvement.
Regular breaks, ergonomic seating, screen brightness adjustments, proper posture.
28
New cards
Describe the strategies for improving computer use in terms of health.
Regular breaks, ergonomic seating, screen brightness adjustments, proper posture.
29
New cards
What is data monitoring?
Tracking data flow to ensure compliance or detect issues.
30
New cards
Describe e-safety issues before publishing a web page.
Personal info protection, copyright compliance, offensive content, secure connections.
31
New cards
Discuss methods to minimize health problems from computer use.
Adjust chair height, screen at eye level, wrist rests, regular breaks.
32
New cards
What are moderated and unmoderated forums?
Moderated: Messages reviewed before posting. Unmoderated: No review process.
33
New cards
Describe how to recognize a phishing email.
Generic greetings, incorrect spelling, suspicious attachments, requests personal info.
34
New cards
How do you identify a phishing email?
Generic greetings, incorrect spelling, suspicious attachments, requests personal info.
35
New cards
List effects of viruses on a computer.
Data loss, system crashes, unauthorized access, slow performance.
36
New cards
How can the risk of viruses be reduced?
Use antivirus software, avoid suspicious emails, update software regularly.
37
New cards
What strategies minimize the dangers of social networking sites?
Limit personal info sharing, use privacy settings, don't accept unknown requests.
38
New cards
Explain strategies to protect yourself while using emails.
Spam filters, verify sender, don't open unknown attachments, strong passwords.
39
New cards
What is hacking?
Unauthorized access to a computer system.
40
New cards
Describe measures to protect data from hacking.
Firewalls, encryption, strong passwords, two-factor authentication.
41
New cards
What are the advantages of a web browser over a search engine?
Direct navigation, bookmarks, secure connections.
42
New cards
Give three actions that break copyright.
Copying software, distributing movies without permission, plagiarizing text.
43
New cards
Discuss the advantages and disadvantages of biometric systems vs. traditional security methods.
Advantages: Unique identification, hard to forge. Disadvantages: Expensive, privacy issues.
44
New cards
Describe three ways John could protect his home computer from infection.
Antivirus software, regular updates, avoid suspicious downloads.
45
New cards
What should John do to remove a virus threat?
Disconnect from the Internet, run antivirus, delete/quarantine infected files.
46
New cards
Explain what cookies are and why they're important to companies.
Small data files tracking user activity; help personalize ads, improve user experience.
47
New cards
Describe strategies students should use to stay safe on the World Wide Web.
Limit personal info, verify sources, strong passwords, avoid suspicious links.
48
New cards
List strategies students should use to stay safe when emailing.
Spam filters, don't open attachments, verify sender, strong passwords.
49
New cards
Ffiona wants to communicate with her friend via mobile. How can she do this?
Calls, SMS, video calls, social media, instant messaging.
50
New cards
Explain a URL.
Uniform Resource Locator; the web address of a resource on the Internet.
51
New cards
Describe methods to minimize password misuse if intercepted.
Two-factor authentication, regular changes, strong passwords, don't share.
52
New cards
What benefits does internet banking offer customers?
Convenience, 24/7 access, real-time updates.
53
New cards
Why isn't a user ID and password secure for online banking?
Easily guessed, susceptible to phishing. Use two-factor authentication, biometric IDs.
54
New cards
Define a hyperlink.
Word/phrase/image that links to another document/page/website when clicked.
55
New cards
What is a hyperlink?
Word/phrase/image that links to another document/page/website when clicked.
56
New cards
Describe what HTTPS means.
Secure HTTP protocol ensuring encrypted data transmission.
57
New cards
What does HTTPS stand for?
Secure HTTP protocol ensuring encrypted data transmission.
58
New cards
Explain '.uk' in a web address.
Indicates the domain is registered in the United Kingdom.
59
New cards
What does '.uk' signify in a web address?
Indicates the domain is registered in the United Kingdom.
60
New cards
What is spam email?
Junk email, unsolicited messages, often containing ads or scams.
61
New cards
Define spam email.
Junk email, unsolicited messages, often containing ads or scams.
62
New cards
Why should spam emails be prevented?
May contain spyware, phishing, malware, fills inbox, solicits personal data.
63
New cards
Explain how to identify spam emails.
Generic greeting, incorrect spelling, plain text, suspicious attachments.
64
New cards
Describe how to prevent spam.
Don't opt into marketing emails, use spam filters, never reply, delete old accounts.
65
New cards
How can spam emails be prevented?
Don't opt into marketing emails, use spam filters, never reply, delete old accounts.
66
New cards
List methods to identify spam.
Generic greeting, incorrect spelling, plain text, suspicious attachments.
67
New cards
What is personal data?
Name, phone number, address, email, gender, date of birth.
68
New cards
Explain how attachments may need to be compressed for email.
Larger files can be zipped to reduce size for email attachment.
69
New cards
How can attachments be compressed for email?
Larger files can be zipped to reduce size for email attachment.
70
New cards
Describe the purpose of the 'reply' function in emails.
Allows responding to the sender without retyping the address.
71
New cards
What is the 'reply' function in emails?
Allows responding to the sender without retyping the address.
72
New cards
What is the purpose of software copyright?
Protects software from unauthorized copying, distribution, and modification.
73
New cards
Explain software copyright.
Protects software from unauthorized copying, distribution, and modification.
74
New cards
Compare intranet and internet.
Intranet: Private, limited to an organization. Internet: Global, public.
75
New cards
What is the difference between intranet and internet?
Intranet: Private, limited to an organization. Internet: Global, public.
76
New cards
Describe cloud storage.
Remote storage of files on internet servers, accessible from any device.
77
New cards
What is cloud storage?
Remote storage of files on internet servers, accessible from any device.
78
New cards
Discuss the advantages and disadvantages of policing the internet.
Advantages: Prevents crime, protects children. Disadvantages: Privacy concerns, censorship.
79
New cards
Define blog, wiki, and VoIP.
Blog: Online journal. Wiki: Collaborative website. VoIP: Voice over Internet Protocol.
80
New cards
What is the main purpose of a web browser?
View webpages, access websites, search the Internet.
81
New cards
Explain cloud computing.
Using remote servers on the Internet to store, manage, and process data.
82
New cards
What is cloud computing?
Using remote servers on the Internet to store, manage, and process data.
83
New cards
Describe how software can be protected from piracy.
Activation keys, encryption, digital rights management (DRM).
84
New cards
What is software piracy protection?
Measures like activation keys, encryption, and digital rights management (DRM).
85
New cards
Give four reasons why internet searches may not be fast.
Too many results, poor search terms, slow Internet, website load times.
86
New cards
List four reasons why internet searches can be slow.
Too many results, poor search terms, slow Internet, website load times.
87
New cards
What is an intranet?
Private network within an organization.
88
New cards
Describe what is meant by an intranet.
Private network within an organization.
89
New cards
What is the Internet?
Global network of interconnected computers.
90
New cards
Describe the Internet.
Global