1/27
This set of flashcards covers ICT Unit $$11.3$$, focusing on computer security threats, backup types, impacts of automation on employment, e-commerce, and data protection protocols.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
To prevent computer theft, one should use a __________ and nondescript bags.
tracking device
__________ is defined as malicious damage to computer systems (Cps).
Vandalism
__________ is a method of banking where transactions are conducted electronically.
online/phone banking
__________ involves hosting a service to an organization or individual using the internet.
Cloud Computing
A __________ is where you store your own money, whereas a credit card is where you borrow money and pay later with interest.
Debit card
One of the roles of computers in __________ is system diagnosis using advanced tools, which can risk life if system failure occurs.
Medical use
In military and scientific research, computers are used for drones and __________.
Surveillance
An __________ threat comes from outside the computer system, such as the stealing of equipment or viruses damaging the system.
External threat
An __________ threat occurs inside the system, such as when workers accidentally damage or lose files.
Internal threat
Power loss or hardware failure occurring on a regular basis are classified as __________ threats.
Accidental threats
A __________ is a copy of the original file kept on a storage medium in case the original is lost or damaged.
Backup
A __________ backup copies every file to a storage medium.
Full backup
An __________ backup copies only the files that have changed since the last backup.
Incremental backup
A __________ is an assessment that helps an organization recover and operate normally after a disaster.
Disaster Recovery Plan (DRP)
__________ is the process of encoding data using a key so it is unreadable if intercepted.
encryption
__________ is the term used when a worker's skills are replaced with automation, causing their skill level to be reduced.
Deskilling
When a worker's job is totally replaced and they lose their job, it is called __________.
Redundancy
__________ is the practice of working from home using ICT equipment like cell phones and computers.
Telecommuting
A __________ is a centralized space where phone calls are handled in an organization.
call centre
Electronic commerce (E-commerce) allows producers to deal directly with consumers and is open __________ hours a day.
24
__________ is a protocol that encrypts data between a browser and a web server.
SSL (Secure Socket Layer)
The secure protocol used for transactions worldwide is __________.
HTTPS (hypertext transfer protocol)
__________ are used to authenticate the sender of a document.
Digital signatures
Identification and access control using unique physical characteristics like fingerprint or iris scans is known as __________.
Biometrics
A __________ is a type of malware that self-replicates across networks.
worm
A __________ is malware that pretends to be helpful but is actually harmful.
Trojan horse
__________ involves fake emails pretending to be from legitimate sources to steal information.
phishing
If a system failure is caused by software corruption, the user should __________.
reinstall OS