Email legislation are laws that protect people against the misuse of emails.
Give 4 examples of email laws.
Emails are not sent out with misleading subject lines
Company must have a clear way for recipients to opt-out
Companies must make their privacy policy clear to subscribers
Companies must provide subscribers with a way to unsubscribe from listings
Give examples of unacceptable language
obscene images
language that is regarded as abusive
Racist, exploitative messages
use of illegal materials/messages
Give 4 examples of guidelines set by an employer
Employees should only use the companys email system for business use
It must be clear what email content in not permitted
Staff need to be aware of the duration of storing emails.
Acceptable style/tone of emails must be clear
Give 4 methods of increasing security of emails.
use strong passwords
Change passwords on a regular basis
Use spam filters
use anti-virus/anti-spyware software
Give 4 examples of Netiquette.
Do not be abusive
respect other peoples privacy
Check your grammar and spelling
be clear with your message
Give 3 advantages of using email groups.
Easier to send out multiple emails if the addresses are all grouped together
Can be used for marketing purposes
Can be used to set up meetings
What constraints need to be considered when writing and sending emails?
Using acceptable language
Following guidelines set by an employer
Respect others privacy
Abide by copyright
Use appropriate security of emails
Use password protection
Define the term spam.
Spam is an unsolicited emaol sent over the internet. It is sent to many recipients and can contain viruses/phishing scams.
Give 4 advantages of using the internet to find information
Information is up to date
Internet has vast amount of information
Searching for information is fast and easy
Information on the internet is free
Give 4 disadvantages of using the internet to find information.
The internet is not regulated
Easy to be distracted when searching on the internet
There could be information overload
risk of accessing inappropriate websites when using search engines
What is a moderated forum?
A moderated forum is a forum where all user comments are checked by an administrator before they are posted. Moderated forums have policies and they filter out inappropriate posts.
What is an unmoderated forum?
An unmoderated forum is an online discussion. All users can comment but no administrators check the content before it is posted. It allows people to post any content even if it is offensive.
Give 4 features of a blog.
it is updated on a regular basis
It is organised in reverse chronological order
It is public
Entries come from a single author
Give 4 features of wikis.
Anyone can modify, delete, and edit content
Many authors can be involved in a wiki
Pages can be organised anyway the author wishes
keeps track of all entries
Give 4 features of Social Networking Sites.
1.Each member can build their own private/public profiles
2. possible to upload content such as texts, videos etc.
3.Free instant messaging and video chatting
4.Possible to invite people to become friends
Give 2 reasons why copyright legislation is required.
Protects the rights of creaters
Prevents unauthorised use of software
Describe the differences between the internet and the WWW
-The internet is a global network of computers connected through a system of routers and servers. It is an infrastructure
-The WWW is a collection of web pages that can be accessed using the internet. The WWW can be accessed using a web browser.
State 4 safety hazards.
Electrocution
Fire Hazard
Tripping Hazard
Personal Injury
Give 4 principles of DPA
Data must be fairly and lawfully processed
Data must be kept accurate
Data must not be kept longer than necessary
Data must be kept secure
Name 2 causes of Electrocution.
Spilling liquids on electric equipment
Exposed wires
Give 2 causes of fire hazards
Overloaded wall sockets
Overheating of electric equipment due to poor heat dissipation
Give 2 causes of tripping hazards.
Trailing wires on the floor
Damaged carpets/flooring
Give 2 causes of personal injury.
Heavy equipment being unstable and falling from desks
Desks collapsing under weight
Give 4 examples of personal data.
name, address, IP address, DOB
Give 4 examples of sensitive data.
ethniticity, political views, gender, medical history
Which three rules should be followed when creating a password.
use at least one capital letter, use at least one numerical value, use at least one special character.
Give 2 examples of biometric data
fingerprint scan, face recognition
Explain problems that may occur when employees change their passwords regularly.
difficult for them to remember their current password, passwords could be similar making the security system weaker, password could be forgotten and the computer may have to be resetted
What is the purpose of a digital certificate?
A digital certificate ensures that the website is trusted and is used for authentication. It verifies if the company owns the website
State three items in a digital certificate.
senders name, name of digital certificate owner, expiry date
Explain the purpose of 2 factor authentication.
To protect users data and make it more secure by adding another layer of security.
How can disclosure of personal data be avoided?
Encrypting data incase its disclosed
using strong passwords
having privacy setting enabled
having privacy settings enabled on social media
Do not fall for phishing and pharming scams
What is personal data and give an example .
Personal data is data that can be used to identify a person from the data itself or from data in conjunction with other information eg Address
How can fire hazards be avoided?
-Ensuring there is good room ventilation
-having a fire extinguisher
How can Electrocution be avoided?
-Cover exposed wires
-Do not allow liquids in the computer room
Give three examples of biometric data.
fingerprint,retina scan, voice recognition
Give 6 ESafety strategies that should be used when instant messaging.
Do not give out personal information
only open messages from people i know
avoid sending messages with inappropriate language
Enable privacy settings
Do not enable location when messaging
do not send photos of yourself to people you dont know
Desccribe characteristics of an e-publication
multimedia embedded in the pages
allows auto change of pages
users can interact
can be used by many users simultaneously
Give 2 methods to prevent software copyright legislation being broken.
When software is being installed, user should be asked to key in areference number
user should be asked to agree to the license agreement before software is installed