• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/51

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

51 Cards in this Set

  • Front
  • Back
Describe three risks of carelessly sharing personal information on the Internet.
Details being stolen for fraud (e.g. credit card information), Stalking/harassment, Details sold on to advertisers, spam mail, Difficulty in permanently removing such information from the Internet, Theft of money
State two pieces of identification information that a user must provide to log in to any type
Username and Password
Why is it a good idea to use different passwords for different online accounts, and why shouldn't
Passwords should be different so that in the event that an account is hacked into it, the threat is only limited to that one account. Passwords should not include personal details such as the person's name, address, etc. as these are more easily guessed by a hai::ker.
Describe two features of a strong password.
A mixture of letters, numbers and symbols, Fairly long (e.g. at least six characters), No common words or sequences (e.g. password, 123456)
What is a security question? Give an example of a common security question that might be asked.
A good security question should be something that only the user can answer correctly. An example might be: 'What was the name of your favourite teacher at school?'
When signing up for a new account, users often have to solve a challenge test (also known as a captcha). Explain the purpose of this security check.
Captchas are used to verify that a human has created the account- (as opposed to a computer program).This prevents spam accounts being created as only humans are able to understand the text in the distorted image.
Describe, using an example, how the VALIDATION is used as a method to help online data collection forms.
Validation is used to ensure that the data entered is in an acceptable format. For example, there may be drop down lists with pre-defined options to choose from; this prevents any unexpected data being entered
Describe, using an example, how the VERIFICATION is used as a method to help online data collection forms.
Verification is used to prevent errors when entering data. For example, the system might ask the user to enter their email address or password twice; these must match for the user to proceed.
Explain what is meant by an online user profile.
A user profile allows the user to record and display their personal details online. User profiles are used by forums and social networking websites. Profiles can be public or private. A public profile can be viewed by any user, a private profile is hidden to protect the identity of the user.
What is meant by a privacy policy?
A legal statement or document which discloses the exact details of how a company or website gathers and processes information about its users.
Explain the purpose of the Data Protection Act.

The purpose of the Act is to protect personal data when it is being used by individuals or within organisations. These organisations must follow rules on how the data is stored, used, accessed and transmitted.

Outline four basic principles of the Data Protection Act (1998).
Principles are as follows: Data must be fairly and lawfully processed, Date must be accurate and kept up to date, Data must not be kept longer than is necessary, Data held must be adequate and not excessive for the specified purpose, Data must only be used for the purpose specified, Data must be processed in accordance with the rights of the data user, Appropriate measures must be in force to keep the data secure, Data must not be transferred to a country outside the European Union unless they can ensure adequate protection of the data.
Alex and Karen have two young children. Henry is 6 years old and Jacob is 4 years old. Henry buys an app by accident. State one action Alex and Karen could take on their online app shop account to prevent this from happening again?
Any one from: Log out / sign out, Set a password/PIN, Disable/don't enable automatic payments, Don't save payment/account details
Tahira works as a teaching assistant at a school in a developing country. The school has asked her to help students use digital devices in the classroom. A student accesses the system. She sees this challenge response test. Explain why users might be asked to complete a challenge response test.
Improves security, preventing/checking spam, ensure user is human and not bot, only humans interpret challenge test
Sarah is a photographer. She works at her studio and on the move. She uses digital devices for her photography business and hosts her own blog. Sarah uses a router in her studio. State the purpose of a router.
One from: to direct data/network traffic, allow devices to share internet, provide internet access, allow devices to share data
Sarah uses a password to access her router. Give two features of a strong password.
Two from: 5 characters long, mix of numbers/letters, mix of case, special characters, not a word linked to Sarah, not a common word
Stevie logs into a site to buy some music. She sees this lock symbol in her browser. What does this symbol mean?
Data on the site is encrypted
State one other way that browsers display security information.
One way from: https:// is displayed in the address bar, Security status bars are used/green bar is shown on secure websites, A message is displayed by your browser
Sarah receives an email, which contains a hyperlink. Before she follows the hyperlink, Sarah updates her security software. Explain why she does this.
FOUR from: She is concerned or doesn’t recognise the link or sender OR link could run a virus, or open a PHISHING SITE OR the link could put her data at risk OR get security updates OR security updates as new threats come about OR her security definitions might be out of date
List two types of security software.
Any two from Antivirus, Antispyware, Encryption, Firewall. Antiphishing
Ryan uses the airline 'Fast Flights' to travel to overseas athletics events. Ryan decides to buy his flight tickets online. Before he pays, he signs up for an online account. Give two advantages to Ryan of using an online account to buy flight tickets.
Any two advantages from: He can review his account history / previous bookings, He can receive information (e.g. flight offers / new routes) from the company, Rewards / loyalty programme / scheme, Personal details will be saved for quicker ticket purchasing in future.
Tahira works as a teaching assistant at a school in a developing country. The school has asked her to help students use digital devices in the classroom. Discuss how an individual's access to a wide range of online services affects their ability to operate safely in the digital world.
Needs a discussion on whether widespread use of the internet allows people to operate safely like: a) Internet acts as a a backbone to many services (email, www, ftp, gaming, VOIP, broadvands, apps) b) Positive aspects of internet for safety include tracking crminal digital footprints, exposure through social media of security issues and therefore become more resilient, online support and online communities support for issues c) Negative aspects of internet for safety include the fact that people have many online accounts and your passwords are stored globally, user forget passwords, criminals and abusers use the internet, internet can be anonymous, cyberbullying, grooming etc
Which one of these could store Ryan's password information? A- Filter, B- Certificate, C- Bookmark or D- Cookie
D
Give one disadvantage to Ryan of the browser remembering his password.
Could be a security risk / allow others to access his details/account
State why Ryan needs to enter his password twice.
Any one from: To verify what he typed in the first box, To check he typed his password correctly.
Ryan is also asked for a memorable phrase. This will be used in a challenge response test to control access to his online account. Give one other example of the type of information that could be used in a challenge response test
Any one from: Choose numbers from a memorable date, PIN code / passcode / user ID, Choose a memorable image Choose a memorable sound, Biometric (fingerprint etc), CAPTCHA test
Ryan decides to buy his flight tickets online. Before he pays, he signs up for an online account. The website gives Ryan the option to receive offers by email. State one reason why Fast Flights would ask Ryan for his permission before sending him marketing emails.
Any one from: Privacy law, Legislation/legal reasons, Data Protection Act, Good customer service/ so as not to annoy customers / Ryan might not want marketing emails
Stevie produces her own music tracks. She uploads her music to a forum site. Give two reasons for doing this.
Any two reasons from: To get people's opinions of her music, To share her music with other people / to get herself known, To get ideas from other people, To get to know other people with similar interests, To work collaboratively with others
The site says that the password should be at least six characters long, with no spaces. Identify two other features of a strong password.
Any two features from: Uses a mix of upper and lower case, Uses mixture of different characters (numbers, special characters), Not easily guessed (eg. Not name, date of birth)
List two things Stevie must do to keep her password secure.
Any two from: Don't write it down, Change it regularly, Don't tell anyone your password, Don't allow anyone to watch you type it in, Avoid allowing browsers (on shared/public PCs) to remember the password, Use different passwords for different sites, Encrypt passwords
When customers create an account, they are sent an email asking them to activate their account. Explain why this happens.
An explanation: To check that the customer is real (1) to prevent automatic sign ups (1), To prevent fraud (1) by verifying the customer's identity (1), To verify the customer's email address (1) so that the customer can be contacted if username / password is lost / forgotten (1)Max 1 mark for: To prevent the account being used, To make sure that fraud is not occurring / to prevent fraud (1)
iwant is a secure website. Which one of these is not a way of identifying that a website is secure? A- Message on website, B- URL begins 'https://', C- Colour of address bar, D- Padlock symbol

A

Some people are reluctant to shop online. Give two drawbacks to the customer of shopping online rather than in the high street.
Any two from: Have to wait for delivery / items might not arrive, Cost of delivery / hidden costs, Cannot test / try on / see it (physical product) / product not as described, Need to organise / hassle of returning product if not liked, Product damaged during delivery, Security issues (e.g Fraudulent sites / identity theft), Need to be computer literate / have access to suitable payment method, The shopping experience can lack personal interaction with sales staff
Laura starts to receive personalised emails from the online store with offers on discs from similar bands. Explain why the online store sends Laura the emails.
Explanation: To improve Laura's experience, by increasing the relevance of the adverts, Laura has opted in to receive emails from the company (or not opted out), reference to an organisation's marketing strategy (1) or, answers relating to: persuading her to buy more
Describe how the online store is able to send personalised emails to Laura
Description: The online shop have stored/tracked data from her previous transactions (1) and matched that data with other items for sale
Laura does not want to receive these personalised emails. State two ways that she could prevent them from reaching her.
Any two from: Contact the sender to opt out / unsubscribe, Filter her emails / block sender / mark address as spam, Change her email address, Deactivate her email account
Sarah shares her computer with a colleague. They each have a user account. Which one of these actions should Sarah take to prevent her colleague from accessing her information? A- Close her web browser, B- Turn off Bluetooth, C-Log out, D- Use a secure internet connection

C

Tahira wants the students to use hosted applications software on the computers. Before they can use the software each student must create an online account, which includes a personal profile. Give one security measure that a student could use to prevent unauthorised access to their online account.
Password / PIN / Passcode
List three ways in which a student could personalise their account profile.
a) Image/Avatar/Photo/Video or Audio b) Page design / layout / colour / theme c) Personal Info / Bio / Hobbies d) GPS/locastion e) Hyperlinks
Alex needs to contact his bank. Alex enters a password to access his bank account. Which one of these is the strongest password? A- a$5w0aq56, B- Alex1977 C-Pa55word , D-password

A

What does unlimited monthly usage mean when talking about broadband?
There is no cap so you can download as much data as you want each month
What three things should you consider when choosing an ISP?
Expense, is there a limit on what you can download or do, ISP support, ISP provide basic security for you like firewall / anti-SPAM, local contacts
Identify two advantages of using social networking technology rather than SMS to communicate with friends?
Speed, real-time chat, SMS costs, can send message without mobile phone signal, comment and discussion from multiple people, add multimedia links
Explain what is meant by an online user profile.
A user profile is a visual display of personal data associated with a specific user. It can include personal, hobbies, background etc
Explain how the internet could enhance a families daily life
i) Access to all the family of global websites to learn and take part in learning ii) Family can stay in touch easier globally iii) It is a cheap way to communicate / contact via technologies like email, IM, VOIP iv) greater efficiency and time saving when doing mundane tasks like shopping or ordering goods or checking availability v) Get advice and self-help more easily
How could a VLE help with Harry's homework
Check his timetable, upload homework or join in a class discussion onine
Explain how the internet has had an impact on the way that people communicate with each other
People can communicate quickly and cheaply via email, IM, VOIP (Skype), posting on blogs, social media
Explain how the internet has had an impact on the number of people who work from home
More people can work from home and do, communicate from home vai VOIP, emails, IM, use video conferencing for face to face meetings, remotely log onto companies servers
Explain why you should consider deleting your cookies?
Free up storage, stop unsolicited personalised adverts, stop people looking at browsing habits
Explain what cookies do?
They are a small text file sent to your PC or device by the websites and track what you do on that website
Give two harmful effects to the music industry of the illegal copying and sharing of files?
The creators of music are losing the money they need to create and record the music plus can lead to unemployment in the industry