What is a weak password?
Too short, easy to guess, doesn't contain upper/lower case, numbers or symbols.
What makes a password weak?
Too short, easy to guess, doesn't contain upper/lower case, numbers or symbols.
How can passwords be managed?
Change regularly, use strong passwords, don't share them, don't write them down.
Explain the need for copyright legislation.
Protects intellectual property rights and prevents unauthorized copying.
Why is copyright legislation important?
Protects intellectual property rights and prevents unauthorized copying.
Describe four ways software houses can help prevent copyright infringement.
Use activation keys, encryption, user licenses, watermarking.
Explain what is meant by a virus and how it affects a computer.
Malicious software that disrupts system operations, steals data, or damages files.
What is a computer virus?
Malicious software that disrupts system operations, steals data, or damages files.
Explain how key-logging software works.
Records keystrokes to steal information such as passwords and credit card numbers.
What is key-logging software?
Software that records keystrokes to steal sensitive information.
Discuss the advantages and disadvantages of social networking rather than email as a communication method.
Advantages: Quick, global reach. Disadvantages: Privacy risks, information overload.
Explain what is meant by Secure Socket Layer (SSL).
Protocol for secure communication over the Internet using encryption.
What is SSL (Secure Socket Layer)?
A protocol for secure communication over the Internet using encryption.
Describe the features indicating a secure connection in a browser.
Padlock icon, "https" in URL, digital certificates.
What features in a browser indicate a secure connection?
Padlock icon, "https" in URL, digital certificates.
Explain what is meant by hacking and its effects on data or computers.
Unauthorized access to a computer system that may result in data theft or damage.
What is hacking and how does it affect data?
Unauthorized access to a computer system that may result in data theft or damage.
List signs of a virus infection.
Slow performance, frequent crashes, unknown programs running, pop-up ads.
Describe the processes a web browser uses to load a web page.
DNS lookup, sends HTTP request, receives HTML, renders the page.
What steps does a web browser take to load a web page?
DNS lookup, sends HTTP request, receives HTML, renders the page.
Describe other measures to ensure safe online gaming for young people.
Parental controls, limit playtime, educate about privacy, monitor chat.
What measures ensure safe online gaming for young people?
Parental controls, limit playtime, educate about privacy, monitor chat.
Explain data encryption.
Converting data into a secure format to prevent unauthorized access.
What is data encryption?
Converting data into a secure format to prevent unauthorized access.
Explain a digital certificate.
A digital document that verifies the identity of a website or user.
What is a digital certificate?
A digital document that verifies the identity of a website or user.
Evaluate your computer use in terms of health and strategies for improvement.
Regular breaks, ergonomic seating, screen brightness adjustments, proper posture.
Describe the strategies for improving computer use in terms of health.
Regular breaks, ergonomic seating, screen brightness adjustments, proper posture.
What is data monitoring?
Tracking data flow to ensure compliance or detect issues.
Describe e-safety issues before publishing a web page.
Personal info protection, copyright compliance, offensive content, secure connections.
Discuss methods to minimize health problems from computer use.
Adjust chair height, screen at eye level, wrist rests, regular breaks.
What are moderated and unmoderated forums?
Moderated: Messages reviewed before posting. Unmoderated: No review process.
Describe how to recognize a phishing email.
Generic greetings, incorrect spelling, suspicious attachments, requests personal info.
How do you identify a phishing email?
Generic greetings, incorrect spelling, suspicious attachments, requests personal info.
List effects of viruses on a computer.
Data loss, system crashes, unauthorized access, slow performance.
How can the risk of viruses be reduced?
Use antivirus software, avoid suspicious emails, update software regularly.
What strategies minimize the dangers of social networking sites?
Limit personal info sharing, use privacy settings, don't accept unknown requests.
Explain strategies to protect yourself while using emails.
Spam filters, verify sender, don't open unknown attachments, strong passwords.
What is hacking?
Unauthorized access to a computer system.
Describe measures to protect data from hacking.
Firewalls, encryption, strong passwords, two-factor authentication.
What are the advantages of a web browser over a search engine?
Direct navigation, bookmarks, secure connections.
Give three actions that break copyright.
Copying software, distributing movies without permission, plagiarizing text.
Discuss the advantages and disadvantages of biometric systems vs. traditional security methods.
Advantages: Unique identification, hard to forge. Disadvantages: Expensive, privacy issues.
Describe three ways John could protect his home computer from infection.
Antivirus software, regular updates, avoid suspicious downloads.
What should John do to remove a virus threat?
Disconnect from the Internet, run antivirus, delete/quarantine infected files.
Explain what cookies are and why they're important to companies.
Small data files tracking user activity; help personalize ads, improve user experience.
Describe strategies students should use to stay safe on the World Wide Web.
Limit personal info, verify sources, strong passwords, avoid suspicious links.
List strategies students should use to stay safe when emailing.
Spam filters, don't open attachments, verify sender, strong passwords.
Ffiona wants to communicate with her friend via mobile. How can she do this?
Calls, SMS, video calls, social media, instant messaging.
Explain a URL.
Uniform Resource Locator; the web address of a resource on the Internet.
Describe methods to minimize password misuse if intercepted.
Two-factor authentication, regular changes, strong passwords, don't share.
What benefits does internet banking offer customers?
Convenience, 24/7 access, real-time updates.
Why isn't a user ID and password secure for online banking?
Easily guessed, susceptible to phishing. Use two-factor authentication, biometric IDs.
Define a hyperlink.
Word/phrase/image that links to another document/page/website when clicked.
What is a hyperlink?
Word/phrase/image that links to another document/page/website when clicked.
Describe what HTTPS means.
Secure HTTP protocol ensuring encrypted data transmission.
What does HTTPS stand for?
Secure HTTP protocol ensuring encrypted data transmission.
Explain '.uk' in a web address.
Indicates the domain is registered in the United Kingdom.
What does '.uk' signify in a web address?
Indicates the domain is registered in the United Kingdom.
What is spam email?
Junk email, unsolicited messages, often containing ads or scams.
Define spam email.
Junk email, unsolicited messages, often containing ads or scams.
Why should spam emails be prevented?
May contain spyware, phishing, malware, fills inbox, solicits personal data.
Explain how to identify spam emails.
Generic greeting, incorrect spelling, plain text, suspicious attachments.
Describe how to prevent spam.
Don't opt into marketing emails, use spam filters, never reply, delete old accounts.
How can spam emails be prevented?
Don't opt into marketing emails, use spam filters, never reply, delete old accounts.
List methods to identify spam.
Generic greeting, incorrect spelling, plain text, suspicious attachments.
What is personal data?
Name, phone number, address, email, gender, date of birth.
Explain how attachments may need to be compressed for email.
Larger files can be zipped to reduce size for email attachment.
How can attachments be compressed for email?
Larger files can be zipped to reduce size for email attachment.
Describe the purpose of the 'reply' function in emails.
Allows responding to the sender without retyping the address.
What is the 'reply' function in emails?
Allows responding to the sender without retyping the address.
What is the purpose of software copyright?
Protects software from unauthorized copying, distribution, and modification.
Explain software copyright.
Protects software from unauthorized copying, distribution, and modification.
Compare intranet and internet.
Intranet: Private, limited to an organization. Internet: Global, public.
What is the difference between intranet and internet?
Intranet: Private, limited to an organization. Internet: Global, public.
Describe cloud storage.
Remote storage of files on internet servers, accessible from any device.
What is cloud storage?
Remote storage of files on internet servers, accessible from any device.
Discuss the advantages and disadvantages of policing the internet.
Advantages: Prevents crime, protects children. Disadvantages: Privacy concerns, censorship.
Define blog, wiki, and VoIP.
Blog: Online journal. Wiki: Collaborative website. VoIP: Voice over Internet Protocol.
What is the main purpose of a web browser?
View webpages, access websites, search the Internet.
Explain cloud computing.
Using remote servers on the Internet to store, manage, and process data.
What is cloud computing?
Using remote servers on the Internet to store, manage, and process data.
Describe how software can be protected from piracy.
Activation keys, encryption, digital rights management (DRM).
What is software piracy protection?
Measures like activation keys, encryption, and digital rights management (DRM).
Give four reasons why internet searches may not be fast.
Too many results, poor search terms, slow Internet, website load times.
List four reasons why internet searches can be slow.
Too many results, poor search terms, slow Internet, website load times.
What is an intranet?
Private network within an organization.
Describe what is meant by an intranet.
Private network within an organization.
What is the Internet?
Global network of interconnected computers.
Describe the Internet.
Global