ch 8 + 10

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

What is a weak password?

1 / 89

90 Terms

1

What is a weak password?

Too short, easy to guess, doesn't contain upper/lower case, numbers or symbols.

New cards
2

What makes a password weak?

Too short, easy to guess, doesn't contain upper/lower case, numbers or symbols.

New cards
3

How can passwords be managed?

Change regularly, use strong passwords, don't share them, don't write them down.

New cards
4

Explain the need for copyright legislation.

Protects intellectual property rights and prevents unauthorized copying.

New cards
5

Why is copyright legislation important?

Protects intellectual property rights and prevents unauthorized copying.

New cards
6

Describe four ways software houses can help prevent copyright infringement.

Use activation keys, encryption, user licenses, watermarking.

New cards
7

Explain what is meant by a virus and how it affects a computer.

Malicious software that disrupts system operations, steals data, or damages files.

New cards
8

What is a computer virus?

Malicious software that disrupts system operations, steals data, or damages files.

New cards
9

Explain how key-logging software works.

Records keystrokes to steal information such as passwords and credit card numbers.

New cards
10

What is key-logging software?

Software that records keystrokes to steal sensitive information.

New cards
11

Discuss the advantages and disadvantages of social networking rather than email as a communication method.

Advantages: Quick, global reach. Disadvantages: Privacy risks, information overload.

New cards
12

Explain what is meant by Secure Socket Layer (SSL).

Protocol for secure communication over the Internet using encryption.

New cards
13

What is SSL (Secure Socket Layer)?

A protocol for secure communication over the Internet using encryption.

New cards
14

Describe the features indicating a secure connection in a browser.

Padlock icon, "https" in URL, digital certificates.

New cards
15

What features in a browser indicate a secure connection?

Padlock icon, "https" in URL, digital certificates.

New cards
16

Explain what is meant by hacking and its effects on data or computers.

Unauthorized access to a computer system that may result in data theft or damage.

New cards
17

What is hacking and how does it affect data?

Unauthorized access to a computer system that may result in data theft or damage.

New cards
18

List signs of a virus infection.

Slow performance, frequent crashes, unknown programs running, pop-up ads.

New cards
19

Describe the processes a web browser uses to load a web page.

DNS lookup, sends HTTP request, receives HTML, renders the page.

New cards
20

What steps does a web browser take to load a web page?

DNS lookup, sends HTTP request, receives HTML, renders the page.

New cards
21

Describe other measures to ensure safe online gaming for young people.

Parental controls, limit playtime, educate about privacy, monitor chat.

New cards
22

What measures ensure safe online gaming for young people?

Parental controls, limit playtime, educate about privacy, monitor chat.

New cards
23

Explain data encryption.

Converting data into a secure format to prevent unauthorized access.

New cards
24

What is data encryption?

Converting data into a secure format to prevent unauthorized access.

New cards
25

Explain a digital certificate.

A digital document that verifies the identity of a website or user.

New cards
26

What is a digital certificate?

A digital document that verifies the identity of a website or user.

New cards
27

Evaluate your computer use in terms of health and strategies for improvement.

Regular breaks, ergonomic seating, screen brightness adjustments, proper posture.

New cards
28

Describe the strategies for improving computer use in terms of health.

Regular breaks, ergonomic seating, screen brightness adjustments, proper posture.

New cards
29

What is data monitoring?

Tracking data flow to ensure compliance or detect issues.

New cards
30

Describe e-safety issues before publishing a web page.

Personal info protection, copyright compliance, offensive content, secure connections.

New cards
31

Discuss methods to minimize health problems from computer use.

Adjust chair height, screen at eye level, wrist rests, regular breaks.

New cards
32

What are moderated and unmoderated forums?

Moderated: Messages reviewed before posting. Unmoderated: No review process.

New cards
33

Describe how to recognize a phishing email.

Generic greetings, incorrect spelling, suspicious attachments, requests personal info.

New cards
34

How do you identify a phishing email?

Generic greetings, incorrect spelling, suspicious attachments, requests personal info.

New cards
35

List effects of viruses on a computer.

Data loss, system crashes, unauthorized access, slow performance.

New cards
36

How can the risk of viruses be reduced?

Use antivirus software, avoid suspicious emails, update software regularly.

New cards
37

What strategies minimize the dangers of social networking sites?

Limit personal info sharing, use privacy settings, don't accept unknown requests.

New cards
38

Explain strategies to protect yourself while using emails.

Spam filters, verify sender, don't open unknown attachments, strong passwords.

New cards
39

What is hacking?

Unauthorized access to a computer system.

New cards
40

Describe measures to protect data from hacking.

Firewalls, encryption, strong passwords, two-factor authentication.

New cards
41

What are the advantages of a web browser over a search engine?

Direct navigation, bookmarks, secure connections.

New cards
42

Give three actions that break copyright.

Copying software, distributing movies without permission, plagiarizing text.

New cards
43

Discuss the advantages and disadvantages of biometric systems vs. traditional security methods.

Advantages: Unique identification, hard to forge. Disadvantages: Expensive, privacy issues.

New cards
44

Describe three ways John could protect his home computer from infection.

Antivirus software, regular updates, avoid suspicious downloads.

New cards
45

What should John do to remove a virus threat?

Disconnect from the Internet, run antivirus, delete/quarantine infected files.

New cards
46

Explain what cookies are and why they're important to companies.

Small data files tracking user activity; help personalize ads, improve user experience.

New cards
47

Describe strategies students should use to stay safe on the World Wide Web.

Limit personal info, verify sources, strong passwords, avoid suspicious links.

New cards
48

List strategies students should use to stay safe when emailing.

Spam filters, don't open attachments, verify sender, strong passwords.

New cards
49

Ffiona wants to communicate with her friend via mobile. How can she do this?

Calls, SMS, video calls, social media, instant messaging.

New cards
50

Explain a URL.

Uniform Resource Locator; the web address of a resource on the Internet.

New cards
51

Describe methods to minimize password misuse if intercepted.

Two-factor authentication, regular changes, strong passwords, don't share.

New cards
52

What benefits does internet banking offer customers?

Convenience, 24/7 access, real-time updates.

New cards
53

Why isn't a user ID and password secure for online banking?

Easily guessed, susceptible to phishing. Use two-factor authentication, biometric IDs.

New cards
54

Define a hyperlink.

Word/phrase/image that links to another document/page/website when clicked.

New cards
55

What is a hyperlink?

Word/phrase/image that links to another document/page/website when clicked.

New cards
56

Describe what HTTPS means.

Secure HTTP protocol ensuring encrypted data transmission.

New cards
57

What does HTTPS stand for?

Secure HTTP protocol ensuring encrypted data transmission.

New cards
58

Explain '.uk' in a web address.

Indicates the domain is registered in the United Kingdom.

New cards
59

What does '.uk' signify in a web address?

Indicates the domain is registered in the United Kingdom.

New cards
60

What is spam email?

Junk email, unsolicited messages, often containing ads or scams.

New cards
61

Define spam email.

Junk email, unsolicited messages, often containing ads or scams.

New cards
62

Why should spam emails be prevented?

May contain spyware, phishing, malware, fills inbox, solicits personal data.

New cards
63

Explain how to identify spam emails.

Generic greeting, incorrect spelling, plain text, suspicious attachments.

New cards
64

Describe how to prevent spam.

Don't opt into marketing emails, use spam filters, never reply, delete old accounts.

New cards
65

How can spam emails be prevented?

Don't opt into marketing emails, use spam filters, never reply, delete old accounts.

New cards
66

List methods to identify spam.

Generic greeting, incorrect spelling, plain text, suspicious attachments.

New cards
67

What is personal data?

Name, phone number, address, email, gender, date of birth.

New cards
68

Explain how attachments may need to be compressed for email.

Larger files can be zipped to reduce size for email attachment.

New cards
69

How can attachments be compressed for email?

Larger files can be zipped to reduce size for email attachment.

New cards
70

Describe the purpose of the 'reply' function in emails.

Allows responding to the sender without retyping the address.

New cards
71

What is the 'reply' function in emails?

Allows responding to the sender without retyping the address.

New cards
72

What is the purpose of software copyright?

Protects software from unauthorized copying, distribution, and modification.

New cards
73

Explain software copyright.

Protects software from unauthorized copying, distribution, and modification.

New cards
74

Compare intranet and internet.

Intranet: Private, limited to an organization. Internet: Global, public.

New cards
75

What is the difference between intranet and internet?

Intranet: Private, limited to an organization. Internet: Global, public.

New cards
76

Describe cloud storage.

Remote storage of files on internet servers, accessible from any device.

New cards
77

What is cloud storage?

Remote storage of files on internet servers, accessible from any device.

New cards
78

Discuss the advantages and disadvantages of policing the internet.

Advantages: Prevents crime, protects children. Disadvantages: Privacy concerns, censorship.

New cards
79

Define blog, wiki, and VoIP.

Blog: Online journal. Wiki: Collaborative website. VoIP: Voice over Internet Protocol.

New cards
80

What is the main purpose of a web browser?

View webpages, access websites, search the Internet.

New cards
81

Explain cloud computing.

Using remote servers on the Internet to store, manage, and process data.

New cards
82

What is cloud computing?

Using remote servers on the Internet to store, manage, and process data.

New cards
83

Describe how software can be protected from piracy.

Activation keys, encryption, digital rights management (DRM).

New cards
84

What is software piracy protection?

Measures like activation keys, encryption, and digital rights management (DRM).

New cards
85

Give four reasons why internet searches may not be fast.

Too many results, poor search terms, slow Internet, website load times.

New cards
86

List four reasons why internet searches can be slow.

Too many results, poor search terms, slow Internet, website load times.

New cards
87

What is an intranet?

Private network within an organization.

New cards
88

Describe what is meant by an intranet.

Private network within an organization.

New cards
89

What is the Internet?

Global network of interconnected computers.

New cards
90

Describe the Internet.

Global

New cards

Explore top notes

note Note
studied byStudied by 12 people
... ago
5.0(1)
note Note
studied byStudied by 23 people
... ago
5.0(3)
note Note
studied byStudied by 58 people
... ago
5.0(1)
note Note
studied byStudied by 13 people
... ago
5.0(1)
note Note
studied byStudied by 35 people
... ago
5.0(1)
note Note
studied byStudied by 7 people
... ago
5.0(1)
note Note
studied byStudied by 41 people
... ago
5.0(1)
note Note
studied byStudied by 33506 people
... ago
4.8(239)

Explore top flashcards

flashcards Flashcard (37)
studied byStudied by 3 people
... ago
5.0(1)
flashcards Flashcard (25)
studied byStudied by 4 people
... ago
5.0(1)
flashcards Flashcard (196)
studied byStudied by 29 people
... ago
5.0(1)
flashcards Flashcard (34)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (40)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (48)
studied byStudied by 10 people
... ago
5.0(1)
flashcards Flashcard (64)
studied byStudied by 42 people
... ago
5.0(1)
flashcards Flashcard (25)
studied byStudied by 45 people
... ago
5.0(6)
robot