ICt chapters 8,9 and 10

Cards (53)

  • Define email legislation
    Email legislation are laws that protect people against the misuse of emails.
  • Give 4 examples of email laws.
    1. Emails are not sent out with misleading subject lines
    2. Company must have a clear way for recipients to opt-out
    3. Companies must make their privacy policy clear to subscribers
    4. Companies must provide subscribers with a way to unsubscribe from listings
  • Give examples of unacceptable language
    1. obscene images
    2. language that is regarded as abusive
    3. Racist, exploitative messages
    4. use of illegal materials/messages
  • Give 4 examples of guidelines set by an employer
    1. Employees should only use the companys email system for business use
    2. It must be clear what email content in not permitted
    3. Staff need to be aware of the duration of storing emails.
    4. Acceptable style/tone of emails must be clear
  • Give 4 methods of increasing security of emails.
    1. use strong passwords
    2. Change passwords on a regular basis
    3. Use spam filters
    4. use anti-virus/anti-spyware software
  • Give 4 examples of Netiquette.
    1. Do not be abusive
    2. respect other peoples privacy
    3. Check your grammar and spelling
    4. be clear with your message
  • Give 3 advantages of using email groups.
    1. Easier to send out multiple emails if the addresses are all grouped together
    2. Can be used for marketing purposes
    3. Can be used to set up meetings
  • What constraints need to be considered when writing and sending emails?
    1. Using acceptable language
    2. Following guidelines set by an employer
    3. Respect others privacy
    4. Abide by copyright
    5. Use appropriate security of emails
    6. Use password protection
  • Define the term spam.
    Spam is an unsolicited emaol sent over the internet. It is sent to many recipients and can contain viruses/phishing scams.
  • Give 4 advantages of using the internet to find information
    1. Information is up to date
    2. Internet has vast amount of information
    3. Searching for information is fast and easy
    4. Information on the internet is free
  • Give 4 disadvantages of using the internet to find information.
    1. The internet is not regulated
    2. Easy to be distracted when searching on the internet
    3. There could be information overload
    4. risk of accessing inappropriate websites when using search engines
  • What is a moderated forum?

    A moderated forum is a forum where all user comments are checked by an administrator before they are posted. Moderated forums have policies and they filter out inappropriate posts.
  • What is an unmoderated forum?
    An unmoderated forum is an online discussion. All users can comment but no administrators check the content before it is posted. It allows people to post any content even if it is offensive.
  • Give 4 features of a blog.
    1. it is updated on a regular basis
    2. It is organised in reverse chronological order
    3. It is public
    4. Entries come from a single author
  • Give 4 features of wikis.
    1. Anyone can modify, delete, and edit content
    2. Many authors can be involved in a wiki
    3. Pages can be organised anyway the author wishes
    4. keeps track of all entries
  • Give 4 features of Social Networking Sites.
    1.Each member can build their own private/public profiles
    2. possible to upload content such as texts, videos etc.
    3.Free instant messaging and video chatting
    4.Possible to invite people to become friends
  • Give 2 reasons why copyright legislation is required.
    1. Protects the rights of creaters
    2. Prevents unauthorised use of software
  • Describe the differences between the internet and the WWW
    -The internet is a global network of computers connected through a system of routers and servers. It is an infrastructure
    -The WWW is a collection of web pages that can be accessed using the internet. The WWW can be accessed using a web browser.
  • State 4 safety hazards.
    1. Electrocution
    2. Fire Hazard
    3. Tripping Hazard
    4. Personal Injury
  • Give 4 principles of DPA
    1. Data must be fairly and lawfully processed
    2. Data must be kept accurate
    3. Data must not be kept longer than necessary
    4. Data must be kept secure
  • Name 2 causes of Electrocution.
    1. Spilling liquids on electric equipment
    2. Exposed wires
  • Give 2 causes of fire hazards
    1. Overloaded wall sockets
    2. Overheating of electric equipment due to poor heat dissipation
  • Give 2 causes of tripping hazards.
    1. Trailing wires on the floor
    2. Damaged carpets/flooring
  • Give 2 causes of personal injury.
    1. Heavy equipment being unstable and falling from desks
    2. Desks collapsing under weight
  • Give 4 examples of personal data.
    name, address, IP address, DOB
  • Give 4 examples of sensitive data.
    ethniticity, political views, gender, medical history
  • Which three rules should be followed when creating a password.
    use at least one capital letter, use at least one numerical value, use at least one special character.
  • Give 2 examples of biometric data
    fingerprint scan, face recognition
  • Explain problems that may occur when employees change their passwords regularly.

    difficult for them to remember their current password, passwords could be similar making the security system weaker, password could be forgotten and the computer may have to be resetted
  • What is the purpose of a digital certificate?
    A digital certificate ensures that the website is trusted and is used for authentication. It verifies if the company owns the website
  • State three items in a digital certificate.
    senders name, name of digital certificate owner, expiry date
  • Explain the purpose of 2 factor authentication.

    To protect users data and make it more secure by adding another layer of security.
  • How can disclosure of personal data be avoided?
    1. Encrypting data incase its disclosed
    2. using strong passwords
    3. having privacy setting enabled
    4. having privacy settings enabled on social media
    5. Do not fall for phishing and pharming scams
  • What is personal data and give an example .
    Personal data is data that can be used to identify a person from the data itself or from data in conjunction with other information eg Address
  • How can fire hazards be avoided?
    -Ensuring there is good room ventilation
    -having a fire extinguisher
  • How can Electrocution be avoided?
    -Cover exposed wires
    -Do not allow liquids in the computer room
  • Give three examples of biometric data.
    fingerprint,retina scan, voice recognition
  • Give 6 ESafety strategies that should be used when instant messaging.
    1. Do not give out personal information
    2. only open messages from people i know
    3. avoid sending messages with inappropriate language
    4. Enable privacy settings
    5. Do not enable location when messaging
    6. do not send photos of yourself to people you dont know
  • Desccribe characteristics of an e-publication
    1. multimedia embedded in the pages
    2. allows auto change of pages
    3. users can interact
    4. can be used by many users simultaneously
  • Give 2 methods to prevent software copyright legislation being broken.
    1. When software is being installed, user should be asked to key in a reference number
    2. user should be asked to agree to the license agreement before software is installed