Computing

Cards (47)

  • A monitor should be able to tilt to ensure that an employees neck doesnt hurt.
  • The keyboard should have wrist rests so the employee can type without straining their wrists
  • employees should take breaks every hour or two to stretch and move around
  • Employers must make sure all equipment is safe, well maintained and tested regularly
  • If employers are not following these rules they could face fines and even imprisonment
  • health and safety in a computer room is important to prevent physical injuries like tripping over cables
  • Eye strain can cause headaches and migraines which can lead to depression if it happens often enough
  • Computer screens emit blue light which can disrupt sleep patterns leading to insomnia and fatigue during the day
  • Adjust the backrest of your chair to a 100-110 degree angle.
  • What does the DPA do?
    It allows you to have the right to find out what information the government and other organisations store about you
  • Copyright is a type of...

    intellectual property that protects the original works of authorship as soon as an author fixes the work in a tangible form of expression
  • Copyright protects your work and stops others from using it without your permission
  • personal information is information that can be used to identify an individual, such as a name, address or number.
  • push your hips as far back as they can go in the chair
  • Plagiarism is when someone takes another persons work or ideas and passes them off as their own
  • paraphrasing the work of others by altering a few words and changing their order, or by closely following the structure of their argument is plagiarism if you do not give due acknowledgment to the author whose work you are using
  • Copyright provides creators with the exclusive right to use, reproduce and distribute their work
  • But giving credit isn't plagiarism
  • A cybercrime is criminal activities carried out by means of computers or the internet
  • Emails demanding urgent action might be...

    email scams that want you to act without thinking
  • Emails with bad grammar and spelling
    are most likely email scammers
  • Phishing emails may look like they come from your bank or other trusted source
  • Emails with an unfamiliar greeting may also be email scams
  • Inconsistencies in email addresses, links and domain names can be a sign of a phishing attack / email scam
  • If you receive an email asking you to confirm your identity, it could be a phishing attempt
  • whaling is highly targeted phishing attack aimed at senior executives masquerading as a real/legitimate email
  • Smishing is a social engineering attack that uses fake mobile text messages to trick people into downloading malware, sharing private information or sending money
  • Vishing (voice phishing) is a type of phishing attack that involves fraudulent phone calls or voice messages to get people t hand over information like logins, credit card numbers or bank details
  • Unauthorised access to computer material is a criminal offence under the Computer Misuse Act 1990
  • Unauthorised access to a computer to commit a crime / with the intention to falls under the CMA
  • unauthorised modification of data is illegal and under the CMA
  • making, supplying or obtaining anything which can be used in CMA offences is illegal
  • What type of attacks are vishing?
    Fraudulent phone calls and voice messages
  • What makes emails suspicious?
    • Weird requests
    • Unrecognisable email addresses
    • Not very trustworthy email addresses
    • Unfamiliar/weird attachments/links
  • Malware is any software intentionally designed to cause disruption to a computer, server, client or computer network, leak private information, gain unauthorised access to information or systems, deprive access to information or which knowingly interferes with the user's computer security and privacy
  • Viruses are a type of malicious software, or malware, that spreads between computers and causes damage to data and software
  • What is malware? (The long name)
    Malicious software.
  • Worms are a type of malware that can spread on its own without any human interaction, it spreads to other computers over a network (often LAN)
  • Trojan horse

    A malware that downloads onto a computer and is disguised as a legit program.
  • Spyware collects your personal information and gathers data about you without consent