Operating Online key words

?
ISP
Internet service provider
1 of 17
Blog
A website that is often ran by a small group of people and is regularly updated. Written in an informal style.
2 of 17
Factors in choosing an ISP
cost, bandwidth, download limit, email or web space, security, reliability
3 of 17
Digital footprint
the information about a particular person that exists on the Internet as a result of their online activity.
4 of 17
Phishing
A way of obtaining information by email
5 of 17
Spyware
enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
6 of 17
cookies
a small piece of data sent from a website and stored on the user's computer by the user's web browser while the user is browsing.
7 of 17
data protection act
The data protection act states that companies that request any personal information about you must request the data first and you must give permission before they can obtain it. Then they must protect it from hackers and only keep it for a reasonable
8 of 17
Captcha test
They are needed to allow humans and not bots to have access to a service
9 of 17
security question
Secret questions are used to help people get into their accounts if they forget their passwords, get locked out or as an extra layer of protection. Examples:Mothers maiden name, Nickname, first schools, first street name, first pet.
10 of 17
VLOG
a blog in which the postings are primarily in video form
11 of 17
VLE
Virtual Learning Environment
12 of 17
WIKI
a website or database developed collaboratively by a community of users, allowing any user to add and edit content.
13 of 17
password strength
Stronger passwords are more secure. They may include: numbers, letters, capitals, symbols
14 of 17
using social media safely
Don't post: passwords, address, birthday, personal information
15 of 17
computer misuse act
Making, supplying or obtaining material that could be used in computer misuse offences, Unauthorised modification of computer material, Unauthorised access with intent to commit a crime, Unauthorised access to computer material
16 of 17
Problems with the computewr misuse act
proving guilt can be hard, Ignorance used as defence
17 of 17

Other cards in this set

Card 2

Front

A website that is often ran by a small group of people and is regularly updated. Written in an informal style.

Back

Blog

Card 3

Front

cost, bandwidth, download limit, email or web space, security, reliability

Back

Preview of the back of card 3

Card 4

Front

the information about a particular person that exists on the Internet as a result of their online activity.

Back

Preview of the back of card 4

Card 5

Front

A way of obtaining information by email

Back

Preview of the back of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Operating online resources »