Looks like no one added any tags here yet for you.
Backup
A copy of data created to protect against damage or loss.
User ID
A unique identifier used to log on to a network.
Email filtering
A process to classify and separate spam mails from legitimate emails.
User privilege
The level of access and permissions assigned to a user once they log in to a network.
Administrator
The top-level privilege for a network, responsible for managing passwords and files on the server.
Block and report
Actions to be taken when encountering suspicious or inappropriate users in a network area.
Nickname
An alternative name used instead of a real name on the internet.
Private chat rooms
Online spaces where users should be cautious about sharing personal information.
Password
A combination of letters and numbers used to secure access to a system or account.
Password verification
The process of typing in a password twice to ensure accuracy and prevent input errors.
Password reset
The action of having an administrator change a forgotten password.
Password recovery
The process of retrieving a forgotten password through an email address.
Authentication techniques
Methods that use features of the human body, such as fingerprints or voice recognition, to confirm identity.
Secure webpage
A webpage that starts with "https" and may display a padlock sign, indicating a secure connection.
Phishing
A fraudulent operation that uses emails to gather personal and financial information from recipients.
Digital certificate
An electronic passport used to secure data sent over the internet and verify the sender's trusted source.
Pharming
A scam where malicious code misdirects users to fraudulent websites without their knowledge.
Personal information storage
Concerns about storing personal information and the risk of identity theft.
Spoof websites
Websites created to mimic legitimate ones and gather personal information from users.
Email sender trustworthiness
Digital certificates can confirm the trustworthiness of an email sender.
Phishing email filtering
ISPs attempt to filter out phishing emails to protect their users.
Wireless Personal Area Networking (WPAN)
Bluetooth is an example of this wireless technology.
URLs
Web browsers use URLs to retrieve files from the internet.
Spread spectrum transmission
Radio waves used to provide wireless links between devices and internet connection.
Web addresses
Two forms include standard form (4 numbers) and alphanumeric form.
Small home network
A network created within a home to share resources.
Site address composition
Includes computer name, domain name, domain type, and country code.
HTTP
The protocol commonly used in web addresses.
Camera to mobile phone transfer
Photos can be transferred using this system.
Internet access
Users can access the internet through a web browser.
A method for sending text and attachments from one computer to another over a network.
Dial-up
The slowest type of internet access that ties up a telephone line.
Cable networks
Provide internet access through local cable television operators.
Internet Service Provider (ISP)
A company that provides users with access to the internet.
Router/modem
Connects a LAN to the internet and requires a username and password.
Network environment advantages
Sharing resources, communication between users, and network administrator control and monitoring.
Internet uses
Web browsing, email, file sharing, video conferencing, online banking, entertainment, advertising & blogging, social media.
Wireless LANs (WLANs)
LANs that do not involve any wiring or cabling and use radio or infrared signals.
Access Points (APs)
Used in WLANs to provide wireless network connections over a short distance.
Spread spectrum technology
Usually used by APs in WLANs.
Intranet
A private internet accessible only to specific users.
Biometrics
The use of unique physical characteristics, such as fingerprints, for identification.
Fingerprint scanner
Used in schools to verify and record student attendance.
Embedded processor
A type of computer that controls robots and receives instructions.
Advantages of using robots for repetitive tasks
Efficiency, no wages required, continuous work, and sensor-equipped for gathering information.
Disadvantages of using robots for repetitive tasks
Initial cost, potential denial of access due to fingerprint damages, magnetic field interference with ID cards, and privacy concerns.
Spreadsheets
Used to record students' performances, compare performances, and eliminate the need for paper records.
Software for organizing examinations
Ensures proper enrollment, prints timetables, assigns examination rooms and invigilators, and gathers results in a student database.
School management system
A software system that helps manage various aspects of a school, such as attendance, timetables, bookings, and substitutions.
Absenteeism
The act of being absent or missing from school or work.
Digital tickets
Electronic tickets that are used for various purposes, such as booking seats or tracking attendance.
Timetables
Schedules that outline the timing and sequence of classes or activities.
Teaching cover/substitution
The process of finding a replacement teacher when the original teacher is absent.
Booking system
A system that allows users to make reservations or bookings for various services or events.
Ticket database
A database that stores information related to tickets, such as transaction details and reference numbers.
Wide area network (WAN)
A network that covers a large geographical area and allows for the global sharing of data.
Intranet
A private network that allows for the secure sharing of information within a specific company or organization.
Internet service provider (ISP)
A company that provides internet access to users.
LAN (Local Area Network)
A network that covers a small area, such as a building, and allows for local sharing of data.
Routers, modems, and proxy servers
Hardware devices used in a WAN to facilitate the connection and transmission of data.
Phishing
A fraudulent practice of obtaining sensitive information, such as usernames and passwords, by posing as a trustworthy entity.
Pharming
A technique used to redirect users to fraudulent websites without their knowledge.
Tablet computers
Portable devices with touchscreens that can be used for various purposes, including accessing the internet.
Network security issues
Concerns and challenges related to protecting a network from unauthorized access, hacking, phishing, and viruses.
Video camera
A device used to capture and record video footage.
DV camera
A digital video camera that records footage in a digital format.
Webcam
A camera that is connected to a computer and used for video conferencing or online chatting.
Chip & PIN readers
Devices used for secure payment transactions by reading the chip on a payment card and requiring a PIN.
Optical Mark Reader (OMR)
A device used to read marks written on questionnaires or examination papers.
RFID readers
Devices used to read data from RFID tags, which are attached to or inside objects.
User ID and password protection
A security measure that requires users to provide a unique ID and password to access personal internet journals and email services.
Blogs
Online platforms where individuals can post their observations and thoughts on various topics.
Email groups
Groups of email addresses that make it easier to send out multiple emails by grouping them under one name.
Offensive comments on blogs
Comments that can lead to prosecution as they are not immune from the law.
Spammers
Individuals who create email groups by buying addresses of people from a certain company and sending mass emails.
Wikis
Web pages with an edit button that allow users to easily create and edit web pages without using a web browser.
World Wide Web (WWW)
A system of interlinked hypertext documents accessed via the internet.
Social networking sites
Platforms that enable people to share photos, music, videos, interests, and views with others who share the same interests.
Protocols
A set of rules followed between the sender and recipient of data being transferred between devices.
HyperText Transfer Protocol (HTTP)
A protocol followed between sending and receiving devices when data is being transferred using the internet.
HTTPS
The secure variant of HTTP, which encrypts the data being transferred.
Hyperlink
Data that redirects the user to another webpage or section of the same webpage/file when clicked.
File Transfer Protocol (FTP)
Used to upload website files to the web hosting space, requiring login details to the web hosting server.
Advantages of getting information from websites
Easier access to information through search engines and linking keywords to find relevant information.
Challenges of using information from the internet
Unreliable, inaccurate, or biased information and information overload.
Selecting reliable websites for information
Ensuring the use of websites that properly cite their sources.
Images
Visual content that can be edited and used to enhance content.
Wikis
Anyone can use wikis, but the content should be treated with caution.
Digital to analogue converters (DACs)
Allow for the production of physical scale models and reuse of powders.
Fixed hard disks/drives
The main method used for data storage on computers.
Magnetic backing storage media
Used in many domestic appliances.
Read/write head
Used to write and read data from magnetic storage media.
Advantages of fixed hard disks/drives
Fast data transfer rate, fast access times, and large memory capacities.
Disadvantages of fixed hard disks/drives
Lack of portability and susceptibility to damage.
Buzzers
Used in burglar alarm systems, cookers, and microwave ovens.
Heaters as storage devices
Used in automatic washing machines, cookers, and central heating systems.
Portable and removable hard disks/drives
Used to transfer data, files, and software between computers.
Advantages of lights as storage devices
Fast data access time and transfer rate, large memory capacities, and ability to transfer information between computers.
Disadvantages of lights as storage devices
Susceptibility to damage.
Magnetic tapes and drives
Used in applications where batch processing is used and as backup media.