Save
IT
Save
Share
Learn
Content
Leaderboard
Learn
Created by
Aisha MIRZA
Visit profile
Cards (31)
Advantages of using ad hoc are
Easy to set up
no spwcialist hardware required
What is cloud storage
Allows u to store files and data via the internet
performance issues using ad hoc
If too many devices connected internet can be very slow
if the devices are far away then it cn disconnect
open wi fi
Open wi fi is free wi fi usually offered in places such as airports and cafes
If open wi fi is not encrypted what does that mean?
That its not secure
What
are 3 features of cloud storage?
24/7 availability
scalability
synchronisation
hows Are data centres Protected?
Biometrics
passwords
door
locks
Access
rights
Cloud storage allows users to give
differnet
rights
disaster
recovery policy
Organisations Need to plan for how they can recover system and data in the event of a
disaster
Give 2 features of collaboration tools
Several people can work together on the same
document
changes
are made in
real
time
2
advantages of shared documents
Access
from any device
less papers work to
store
and
archieve
Give
2 feature of scheduling tools
Allows employees to see when others are free
automatic
notifications and
emails
to alert employees
explain 2 types of communication tools
Emails- can’t be sent to a group of people at the same time
video conferences- group of employees can have discussions on both video and audio call
what
are the benefits of working from home?
Better
work-life balance
lower
stress
and more
time
with family
drawbacks
from working from home
Less likely to discover a
range
of opinions
lack of
community
or
opportunities
to meet others
What
is a hacker
A hacker is a person who gets access to a computer system
without
permission
what
are the 2 words malware come from
Malicious-
to cause and act of harm
software
What
is malware
Malware are executable programs that run on a compute r
what is
social
engineering
Social engineering is the ability to
obtain
important
information
by asking people for it
give 2 reasons for attacking system
financial gain
information
and
data theft
What
is
spyware
Allows an
attacker
to spy on a users computer
without
their
consent
What is
phishing
Texts and phone calls are sent to the users commonly pretending to be from a bank
give 2
internal
threats
to
system
unintentional disclosure of data
visiting untrustworthy websites
What makes a good password?
increase
password length
use
numbers
and
symbols
Give
2 password policies
Include at least
one
symbol
include at least on
uppercase
Give 2
biometrics
methods
Iris
scanners
fingerprint
scanners
What
is
acceptable use policy
Is how all employees need to act when using IT
What is
intellectual
property?
something that is not
physical
but has
value
what does
copy
right
do?
Protects
books videos and music from being
stolen
What
does
cookies
allow
the
website
to do
target
advisement
to u
track your
history
and more
What is
Transaction
data
Trasactional data is
data
that is generated as the results of
transaction