ICT Unit $$11.3$$: Impacts on Society and Computer Security

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/27

flashcard set

Earn XP

Description and Tags

This set of flashcards covers ICT Unit $$11.3$$, focusing on computer security threats, backup types, impacts of automation on employment, e-commerce, and data protection protocols.

Last updated 8:07 AM on 5/4/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

28 Terms

1
New cards

To prevent computer theft, one should use a __________ and nondescript bags.

tracking device

2
New cards

__________ is defined as malicious damage to computer systems (Cps).

Vandalism

3
New cards

__________ is a method of banking where transactions are conducted electronically.

online/phone banking

4
New cards

__________ involves hosting a service to an organization or individual using the internet.

Cloud Computing

5
New cards

A __________ is where you store your own money, whereas a credit card is where you borrow money and pay later with interest.

Debit card

6
New cards

One of the roles of computers in __________ is system diagnosis using advanced tools, which can risk life if system failure occurs.

Medical use

7
New cards

In military and scientific research, computers are used for drones and __________.

Surveillance

8
New cards

An __________ threat comes from outside the computer system, such as the stealing of equipment or viruses damaging the system.

External threat

9
New cards

An __________ threat occurs inside the system, such as when workers accidentally damage or lose files.

Internal threat

10
New cards

Power loss or hardware failure occurring on a regular basis are classified as __________ threats.

Accidental threats

11
New cards

A __________ is a copy of the original file kept on a storage medium in case the original is lost or damaged.

Backup

12
New cards

A __________ backup copies every file to a storage medium.

Full backup

13
New cards

An __________ backup copies only the files that have changed since the last backup.

Incremental backup

14
New cards

A __________ is an assessment that helps an organization recover and operate normally after a disaster.

Disaster Recovery Plan (DRP)

15
New cards

__________ is the process of encoding data using a key so it is unreadable if intercepted.

encryption

16
New cards

__________ is the term used when a worker's skills are replaced with automation, causing their skill level to be reduced.

Deskilling

17
New cards

When a worker's job is totally replaced and they lose their job, it is called __________.

Redundancy

18
New cards

__________ is the practice of working from home using ICT equipment like cell phones and computers.

Telecommuting

19
New cards

A __________ is a centralized space where phone calls are handled in an organization.

call centre

20
New cards

Electronic commerce (E-commerce) allows producers to deal directly with consumers and is open __________ hours a day.

2424

21
New cards

__________ is a protocol that encrypts data between a browser and a web server.

SSL (Secure Socket Layer)

22
New cards

The secure protocol used for transactions worldwide is __________.

HTTPS (hypertext transfer protocol)

23
New cards

__________ are used to authenticate the sender of a document.

Digital signatures

24
New cards

Identification and access control using unique physical characteristics like fingerprint or iris scans is known as __________.

Biometrics

25
New cards

A __________ is a type of malware that self-replicates across networks.

worm

26
New cards

A __________ is malware that pretends to be helpful but is actually harmful.

Trojan horse

27
New cards

__________ involves fake emails pretending to be from legitimate sources to steal information.

phishing

28
New cards

If a system failure is caused by software corruption, the user should __________.

reinstall OS