Topic 5 info 2 ICT

?
What is privacy?
Being able to choose to keep certain aspects of your life private.
1 of 13
What is the purpose of User ID's or Usernames?
The computer can allow access for users to their personal settings and files and the computer knows who is using the computer.
2 of 13
What is the use of Passwords?
To protect an ICT system against illegal access and to ensure only authorised users have access to the ICT resources.
3 of 13
What are problems with passwords?
People choose simple words, pet names, own names etc. because it's easier to remember. Passwords are not changed often enough.
4 of 13
What are some rules for passwords?
Include numbers, capital letters, upper and lower case, update it, never share your password or write it down.
5 of 13
Why are employees monitored at work?
The network manager can find out how much time spent on the interent, websites visited etc. therefore they can be disciplined.
6 of 13
What is a cookie?
Small text file downloaded to your computer to collect information about how you use a website.
7 of 13
How are users monitored at home?
Internet connection provides others with details about you e.g. the use of cookies.
8 of 13
What are Internet Service Provider Records (ISP)?
ISP's keep records of your internet use e.g. pages visited, how long, downloads made etc.
9 of 13
What is spyware?
Software which collects information without thier consent about the user of a computer connected to the internet.
10 of 13
What are problems that Spyware can cause?
Identity theft, computer crashes, poor performance, unwanted pop ups and advertising and can disable secruity software.
11 of 13
How can spyware be removed?
Install anti-spyware software which can scan the memory of any spyware running, scan new programs and scan the hard drive to remove the spyware.
12 of 13
How can a user be monitored by others?
This occurs when you walk along a road, using a phone etc. Your habits may be investigated by an ICT system.
13 of 13

Other cards in this set

Card 2

Front

What is the purpose of User ID's or Usernames?

Back

The computer can allow access for users to their personal settings and files and the computer knows who is using the computer.

Card 3

Front

What is the use of Passwords?

Back

Preview of the front of card 3

Card 4

Front

What are problems with passwords?

Back

Preview of the front of card 4

Card 5

Front

What are some rules for passwords?

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all privacy and passwords resources »