Random ICT

HideShow resource information
  • Created by: T Colby
  • Created on: 15-04-15 10:47
Hackers try to get access to data without what?
Permission
1 of 45
Bluejacking is the process of sending unwanted messages to what?
Open Bluetooth connections
2 of 45
Use encryption (encoding data so that only the intended recipient can do what?) for both the transmission and what of data?
Decode it and storage of data
3 of 45
Cloud computing allows users to back up their data how?
Remotely
4 of 45
Phishing cons people into believing that an ... or ... is from a valid organisation so that they give away their username and passwords leading to identity theft.
Email and text
5 of 45
Viruses are designed to be harmful to ... ... and to spread easily over what?
Digital devices and networks
6 of 45
Social networking sites keep track of all your ... and save them so they can be ... ...
Interactions and used later
7 of 45
You may be tricked into downloading ..., allowing users to spy on the information on your ...
Spyware and computer
8 of 45
Tagging people to online photographs is considered an ... of ...
Invasion and privacy
9 of 45
Privacy in the UK is protected by the what?
Data Protection Act
10 of 45
Geolocation information from what? Can track your position
GPS-enabled devices
11 of 45
Playing online games means information about you and who you are playing with is being what?
Monitored
12 of 45
Companies providing ... services know who you send emails to
Email
13 of 45
The use of ... and ... cards allow the banks to know when, where and how much ... you spend.
Credit, debit and money
14 of 45
Mobile phone companies can ... your movements.
Track
15 of 45
Teleworking means ... from ...
Working and home
16 of 45
DPA stands for what?
Data Protection Act
17 of 45
CMA stands for what?
Computer Misuse Act
18 of 45
DEA stands for what?
Digital Economy Act
19 of 45
The 5 causes of unequal access within the UK are what?
Affordabilty, disability/illness, people living in remote areas, cultural factors and lack of knowledge and skills.
20 of 45
The 3 causes of unequal access worldwide are what?
Affordabilty, limited access to electricity and censorship.
21 of 45
Computer equipment emits what?
Heat
22 of 45
Harmful bacteria can live on what?
Surfaces
23 of 45
Use of computer equipement can cause ... strain and r...i
Eye and s
24 of 45
RSI stands for what?
Repetitive strain injury
25 of 45
Digital devices can overheat and become a ... hazard
Fire
26 of 45
E-waste means what?
Old computer equipment ends up as electronic waste that goes to landfill sites.
27 of 45
More developed coutries send waste to ... developed countries
Less
28 of 45
Recycling means what?
Reusing old digital devices.
29 of 45
Producing technology emits ... into the atmosphere which harms the environment.
CO2
30 of 45
State the order of internal memory
Byte, Kilobyte, Megabyte, Gigabyte and Terabyte
31 of 45
What two things do microprocessors have stored in their internal memory?
Program instructions and data
32 of 45
Processors are found in ... digital devices
All
33 of 45
There are specialist micorprocessors for different ...
Devices
34 of 45
Computers contain high capacity ... ... ... to store terabytes of data
Hard disk drives
35 of 45
Flash memory is a type of ... that is ideal for portable ... ...
Peripheral and digital devices
36 of 45
Why is flash memory ideal for portable digital devices?
Doesn't lose dater when turned off, no moving parts so can't easily break (solid state memory) and it is removable so can be used to tranfer data between devices
37 of 45
Name the five types if flash memory
Secure digital card (SD), micro SD cards, SDXC card (exteneded capacity), USB flash drive or memory stick and SDHC card (high capacity)
38 of 45
When producing a digital device companies consider ... and ...
Audience and purpose
39 of 45
Name 10 input devices
Touch-sensitive jog dial, mouse, keyboard, game controller, webcam, touch screen, microphone, joystick, graphics tablet and scanner
40 of 45
Name 6 output devices
Speakers, docking station, headphones, printer, headset and screen
41 of 45
State 6 functions that multifunctional mobile phones can do
GPS reciever, entertainment, productivity, data storage, camera/video camera, internet browsing
42 of 45
State 5 ways to increase mobile phone security
Hide the phone, set a PIN, password, biometric lock, lock the SIM, record the unique IMEI number and restrict Bluetooth usage
43 of 45
Name four types of computer
Desktop computers, laptop computers, netbook computers and tablet computers
44 of 45
State four ICT related health risks
Eye strain, RSI, neck and back problems and pain in knees and legs
45 of 45

Other cards in this set

Card 2

Front

Bluejacking is the process of sending unwanted messages to what?

Back

Open Bluetooth connections

Card 3

Front

Use encryption (encoding data so that only the intended recipient can do what?) for both the transmission and what of data?

Back

Preview of the front of card 3

Card 4

Front

Cloud computing allows users to back up their data how?

Back

Preview of the front of card 4

Card 5

Front

Phishing cons people into believing that an ... or ... is from a valid organisation so that they give away their username and passwords leading to identity theft.

Back

Preview of the front of card 5
View more cards

Comments

RagedGamerNerd

helloooo

RagedGamerNerd

I like de cheeses

the real ryan fayers

do you want to meet  and do revision?

RagedGamerNerd

yes

Ryan Fayers

Hello

bobby

anyone want to buy some green

Similar ICT resources:

See all ICT resources »See all ICT resources »