IT

Cards (31)

  • Advantages of using ad hoc are
    Easy to set up
    no spwcialist hardware required
  • What is cloud storage
    Allows u to store files and data via the internet
  • performance issues using ad hoc
    If too many devices connected internet can be very slow
    if the devices are far away then it cn disconnect
  • open wi fi
    Open wi fi is free wi fi usually offered in places such as airports and cafes
  • If open wi fi is not encrypted what does that mean?
    That its not secure
  • What are 3 features of cloud storage?

    24/7 availability
    scalability
    synchronisation
  • hows Are data centres Protected?
    Biometrics
    passwords
    door locks
  • Access rights 

    Cloud storage allows users to give differnet rights
  • disaster recovery policy 

    Organisations Need to plan for how they can recover system and data in the event of a disaster
  • Give 2 features of collaboration tools
    Several people can work together on the same document
    changes are made in real time
  • 2 advantages of shared documents 

    Access from any device
    less papers work to store and archieve
  • Give 2 feature of scheduling tools 

    Allows employees to see when others are free
    automatic notifications and emails to alert employees
  • explain 2 types of communication tools
    Emails- can’t be sent to a group of people at the same time
    video conferences- group of employees can have discussions on both video and audio call
  • what are the benefits of working from home?

    Better work-life balance
    lower stress and more time with family
  • drawbacks from working from home 

    Less likely to discover a range of opinions
    lack of community or opportunities to meet others
  • What is a hacker 

    A hacker is a person who gets access to a computer system without permission
  • what are the 2 words malware come from 

    Malicious- to cause and act of harm
    software
  • What is malware 

    Malware are executable programs that run on a compute r
  • what is social engineering
    Social engineering is the ability to obtain important information by asking people for it
  • give 2 reasons for attacking system
    financial gain
    information and data theft
  • What is spyware
    Allows an attacker to spy on a users computer without their consent
  • What is phishing
    Texts and phone calls are sent to the users commonly pretending to be from a bank
  • give 2 internal threats to system
    unintentional disclosure of data
    visiting untrustworthy websites
  • What makes a good password?
    increase password length
    use numbers and symbols
  • Give 2 password policies 

    Include at least one symbol
    include at least on uppercase
  • Give 2 biometrics methods
    Iris scanners
    fingerprint scanners
  • What is acceptable use policy
    Is how all employees need to act when using IT
  • What is intellectual property?
    something that is not physical but has value
  • what does copy right do?

    Protects books videos and music from being stolen
  • What does cookies allow the website to do 

    target advisement to u
    track your history and more
  • What is Transaction data
    Trasactional data is data that is generated as the results of transaction