ICT-Chapter 1

?
What is firewall?
a part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
1 of 49
What are the advantages of shopping online?
There is a larger choice online, you can shop from home, you can compare prices, and the stores are open all the time.
2 of 49
What are the disadvantages of shopping online?
You need internet access, you have to wait for delivery, you need a credit/debit card, and you can only view the item online (cannot try the item on).
3 of 49
What are the advantages of using online banking?
the account can be accessed at any time of the day, transactions between accounts are quicker and easier, and you dont need a credit or debit card to access the account.
4 of 49
How can you figure out a phising email?
The message contains poor spelling and grammar, it asks for personal information, it require imediate action, there is a link to a fake webiste, and the name the email has adressed you with is informal or not the right name.
5 of 49
What are the benefits to students of a VLE?
They can hand in work alot easier, and there are forum chats for the students to use.
6 of 49
What are the benefits to teachers of a VLE?
They have alot more storage space and can share documents with their students.
7 of 49
What are the benefits to parents of a VLE?
They can get information about their childs grades, and access their childs homeworks and resources.
8 of 49
What is a processor?
This is the part of the computer which carries out the instructions of the computer, by performing the arithmetic, logic, control and input/output.
9 of 49
What is the RAM?
RAM stands for Random Access Memory. It is sometimes referred to main memory, core memory or system memory, as it is a device which allows memory to be stored and retrieved on a computer.
10 of 49
What is the hard drive?
A hard drive is a disk drive which can read from or write onto hard disks. It is used to permanently store or retrieve information. Storage is the main ‘job’ of the hard drive, so everything that is on the computer gets stored onto it.
11 of 49
What is wireless networking?
Wireless networking is when your computer, laptop or any other portable device uses radio waves to connect up to the internet, without using wires which can get tangled up easily.
12 of 49
What is USB connectivity?
USB stands for universal Serial bus. A USB allows information and data to be transferred. Things that can be connected through USB include printers, scanners and memory sticks. USB ports can also supply electric power across the cable to devices.
13 of 49
What is a graphics card?
The graphics card is a card in your computer which improves the graphics, which is the picture, video, animation and 3D quality. Often, the graphics card is its own device which is then plugged into the motherboard to improve screen quality.
14 of 49
What is Bluetooth?
Bluetooth is a wireless way in which somebody can copy music, photos and videos from one device to another. It can also be used to connect one device to another so that the two devices can work together.
15 of 49
What is an optical drive?
An optical drive is a disc drive that uses laser light or electromagnetic waves as part of the process of writing or reading data to or from disks. Optical disks that can be read by the drive include DVD’s, CD’s and Blu-Ray’s.
16 of 49
Give examples of an input peripheral
Keyboard, mouse, Joy stick, light pen, Scanner, microphone.
17 of 49
Give examples of an output peripheral
Monitor, printer, plotters, speakers, projectors, buzzers, motors, switched outputs, lights.
18 of 49
Give examples of a storage peripheral
Optical storage, tape storage, internal storage, external storage, hard drive disk, memory stick.
19 of 49
Name the types of printers
Laser, inkjet and dot matrix.
20 of 49
What are the uses of GPS on a mobile phone?
They help to determine the location of a person using it, or for determining the location of where a picture was taken.
21 of 49
What is a virus?
A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.
22 of 49
What is spyware?
Programs that secretly record what you do on your computer are called spyware.
23 of 49
What is spam?
? irrelevant or unsolicited messages sent over the Internet, typically to large numbers of users, for the purposes of advertising, phishing, spreading malware, etc.
24 of 49
What is phishing?
the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers, online.
25 of 49
What is a hacker?
a person who uses computers to gain unauthorized access to data.
26 of 49
What is an identity theft?
the fraudulent practice of using another person's name and personal information in order to obtain credit, loans, etc.
27 of 49
What is a computer cookie?
Internet cookies are small pieces of information in text format that are downloaded to your computer when you visit many Web sites.
28 of 49
What is VOIP?
VoIP stands for Voice over Internet Protocol. VoIP allows you to make free, or very low cost, telephone calls over the Internet.
29 of 49
What is POP3?
POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail. POP3 is a client/server protocol in which e-mail is received and held for you by your Internet server.
30 of 49
What is IMAP4?
IMAP4 is a mail protocol that allows users to be disconnected from the main messaging system and still be able to process mail. Users can store messages on a local machine or on a server.
31 of 49
What health issues come from using digital devices?
Eye strain, Back and neck ache, Repetitive Strain Injury (RSI) in Wrists and Hands,
32 of 49
What is the digital divide?
the gulf between those who have ready access to computers and the Internet, and those who do not.
33 of 49
What are the advantages of cookies?
Cookies are simple to use and implement, Occupies less memory, do not require any server resources and are stored on the user's computer so no extra burden on server., Cookies persist a much longer period of time than Session state
34 of 49
What are the disadvantages of cookies?
User has the option of disabling cookies on his computer from browser’s setting, Cookies will not work if the security level is set to high in the browser, Complex type of data not allowed (e.g. dataset etc). It allows only plain text.
35 of 49
What should you consider when choosing an ISP?
Downstream speed, Upstream capacity, Accessible technical support, Equipment quality, Pricing, Equipment flexibility.
36 of 49
What types of networks can you set up other than a wireless network?
1.Local Area Network (LAN).... 2.Wide Area Network (WAN)
37 of 49
Give safety procedures that need to be taken when using a cyber cafe.
Install Keyloggers, Network sniffing software, Close down your browser when you are finished using it and clear your history if you have opened up a file from your email that contains sensitive information delete it.
38 of 49
What are the symptoms of computer addiction?
•Carpal Tunnel Syndrome (pain and numbness in hands and wrists), •Dry eyes or strained vision, •Back aches and neck aches; severe headaches, Sleep disturbances,Pronounced weight gain or weight loss
39 of 49
What are advantages of streaming?
Instant Playback, Piracy Protection.
40 of 49
What are the advantages of downloading?
With downloads, the file has been stored locally and so you can use it off-line, There are plenty of legitimate sites where you can get safe downloads - music, apps, film.
41 of 49
What are the disadvantages of streaming?
Bandwidth Use, Online Only.
42 of 49
What are the disadvantages of downloading?
The file may include DRM protection that you were not expecting when you joined the service, If your computer breaks down or the hard disk fails, then you may lose the software you have bought because you do not have a CD to re-install.
43 of 49
What are the advantages of a gaming console?
Very advanced graphics is one of its key strengths,Cheaper than a dedicated games computer, Each game is written for the specific console, so few problems to do with software incompatibilty.
44 of 49
What are the disadvantages of a gaming console?
Online games can only be played with people using the same console,Does not have a keyboard, so messaging is not easy. Although speaking into a microphone is possible.
45 of 49
What are the advantages of gaming laptop?
The make of computer does not matter when playing with other people online, Excellent for games needing lots of messaging with other people whilst playing.
46 of 49
What are the disadvantages of a gaming laptop?
Input devices are mainly keyboard and mouse although specialised devices such as joystick and wheel can be bought,Booting up the computer and then the game itself can take a while.
47 of 49
What are the advantages of online data storage?
By storing your data online you are reducing the burden of your hard disk, You cannot trust your HDD and storage device every time because it can crash anytime, Most of the online storage sites provide better security.
48 of 49
What are the disadvantages of online data storage?
Improper handing can cause trouble, There are many online storage sites out there but you have to choose the one on which you can trust, To access your files everywhere the only thing you need is internet connection
49 of 49

Other cards in this set

Card 2

Front

What are the advantages of shopping online?

Back

There is a larger choice online, you can shop from home, you can compare prices, and the stores are open all the time.

Card 3

Front

What are the disadvantages of shopping online?

Back

Preview of the front of card 3

Card 4

Front

What are the advantages of using online banking?

Back

Preview of the front of card 4

Card 5

Front

How can you figure out a phising email?

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Acts, Security and Legislation resources »