Podcast
Questions and Answers
Which of the following describes streaming?
Which of the following describes streaming?
- Saving a music file in `.wav` format.
- Sharing films and videos online with many people.
- Copying a file from the Internet to a computer for later viewing.
- The ability to listen to media in real time without downloading. (correct)
Which two components are commonly found on a website to aid user experience?
Which two components are commonly found on a website to aid user experience?
- Podcast
- Navigation Bar (correct)
- RSS
- Web Browser
- URL (correct)
State two advantages of using a broadband connection over a dial-up connection for internet access.
State two advantages of using a broadband connection over a dial-up connection for internet access.
Faster speeds and always-on connectivity
What is one potential disadvantage of using a wireless internet connection?
What is one potential disadvantage of using a wireless internet connection?
What is one advantage of using a wired internet connection?
What is one advantage of using a wired internet connection?
Give two potential issues related to sending and receiving email attachments.
Give two potential issues related to sending and receiving email attachments.
Match the email security threat to its description:
Match the email security threat to its description:
Using ______ in an email can hide recipients' addresses from each other for privacy.
Using ______ in an email can hide recipients' addresses from each other for privacy.
Which activity best exemplifies streaming?
Which activity best exemplifies streaming?
Pay-to-use music download sites always offer full refunds if the downloaded track is of poor quality.
Pay-to-use music download sites always offer full refunds if the downloaded track is of poor quality.
Besides listening to samples, name two other features commonly found on music download sites that help users decide what to purchase.
Besides listening to samples, name two other features commonly found on music download sites that help users decide what to purchase.
What is a primary benefit of streaming music over downloading music files?
What is a primary benefit of streaming music over downloading music files?
A key advantage of using online music platforms is the ability to ______ music from various artists.
A key advantage of using online music platforms is the ability to ______ music from various artists.
All music download services provide tracks in lossless audio formats.
All music download services provide tracks in lossless audio formats.
In the context of online music, what is DRM and why is it used?
In the context of online music, what is DRM and why is it used?
Match each music service feature with its most appropriate description:
Match each music service feature with its most appropriate description:
Attached files with certain file extensions should not be opened unless you ______ the sender.
Attached files with certain file extensions should not be opened unless you ______ the sender.
Which of the following website types allows information to be edited directly from a user's browser?
Which of the following website types allows information to be edited directly from a user's browser?
Which technology is typically situated in an educational establishment to support learning and teaching via interactive online resources and guidance?
Which technology is typically situated in an educational establishment to support learning and teaching via interactive online resources and guidance?
Match the network types with their correct descriptions:
Match the network types with their correct descriptions:
A PAN (Personal Area Network) is typically used to connect computers within an office building.
A PAN (Personal Area Network) is typically used to connect computers within an office building.
What is the general term for a standard method of communication between computer systems when performing tasks?
What is the general term for a standard method of communication between computer systems when performing tasks?
Which of the following file extensions is generally considered safest to open without verifying the sender?
Which of the following file extensions is generally considered safest to open without verifying the sender?
Opening email attachments from unknown senders is always a safe practice if your antivirus software is up to date.
Opening email attachments from unknown senders is always a safe practice if your antivirus software is up to date.
Match the following protocols with their descriptions:
Match the following protocols with their descriptions:
Which software is essential for users to access and interact with the World Wide Web?
Which software is essential for users to access and interact with the World Wide Web?
When a file is deleted from a computer, it is immediately and permanently removed from the hard drive, ensuring no possibility of recovery.
When a file is deleted from a computer, it is immediately and permanently removed from the hard drive, ensuring no possibility of recovery.
Match the following data management terms with their descriptions:
Match the following data management terms with their descriptions:
Define 'phishing' in the context of social networking and online security.
Define 'phishing' in the context of social networking and online security.
What is the purpose of an 'Acceptable Use Policy' (AUP) in an organization or institution?
What is the purpose of an 'Acceptable Use Policy' (AUP) in an organization or institution?
To ensure the confidentiality of recipients when sending an email to multiple people, in which of the following fields should their email addresses be entered?
To ensure the confidentiality of recipients when sending an email to multiple people, in which of the following fields should their email addresses be entered?
The protocol commonly used to transfer files over the Internet is called ______.
The protocol commonly used to transfer files over the Internet is called ______.
In the context of email communication, which option describes sending a copy of an email to someone without the other recipients knowing?
In the context of email communication, which option describes sending a copy of an email to someone without the other recipients knowing?
When completing a secure online form, fields marked with an asterisk (*) typically indicate a ______ Field.
When completing a secure online form, fields marked with an asterisk (*) typically indicate a ______ Field.
Match the type of legislation to its corresponding description:
Match the type of legislation to its corresponding description:
Which of the following is a potential disadvantage of using instant messaging (IM)?
Which of the following is a potential disadvantage of using instant messaging (IM)?
Briefly explain the concept of web conferencing, and provide one advantage and one disadvantage.
Briefly explain the concept of web conferencing, and provide one advantage and one disadvantage.
Explain, using examples, what is meant by client-side processing.
Explain, using examples, what is meant by client-side processing.
The Acceptable Use Policy is related to protecting personal data stored on a computer.
The Acceptable Use Policy is related to protecting personal data stored on a computer.
Which option best describes 'real-time' communication?
Which option best describes 'real-time' communication?
Flashcards
Streaming
Streaming
Watching media in real time without downloading.
Navigation Bar
Navigation Bar
A bar on a website aiding user movement.
URL
URL
Address of a unique resource on the web.
Broadband Advantage
Broadband Advantage
Signup and view all the flashcards
Wireless Disadvantage
Wireless Disadvantage
Signup and view all the flashcards
Wired Connection
Wired Connection
Signup and view all the flashcards
Email Attachment Issues
Email Attachment Issues
Signup and view all the flashcards
Virus (Email Security)
Virus (Email Security)
Signup and view all the flashcards
Cookies
Cookies
Signup and view all the flashcards
Spam
Spam
Signup and view all the flashcards
Local Area Network (LAN)
Local Area Network (LAN)
Signup and view all the flashcards
Data Transmission
Data Transmission
Signup and view all the flashcards
Content Filter
Content Filter
Signup and view all the flashcards
Firewall
Firewall
Signup and view all the flashcards
Protocol
Protocol
Signup and view all the flashcards
Risky Attachments
Risky Attachments
Signup and view all the flashcards
Wiki
Wiki
Signup and view all the flashcards
VLE (Virtual Learning Environment)
VLE (Virtual Learning Environment)
Signup and view all the flashcards
P2P (Peer-to-Peer)
P2P (Peer-to-Peer)
Signup and view all the flashcards
WAN (Wide Area Network)
WAN (Wide Area Network)
Signup and view all the flashcards
LAN (Local Area Network)
LAN (Local Area Network)
Signup and view all the flashcards
PAN (Personal Area Network)
PAN (Personal Area Network)
Signup and view all the flashcards
Required Field
Required Field
Signup and view all the flashcards
Verification
Verification
Signup and view all the flashcards
Security Question
Security Question
Signup and view all the flashcards
Challenge Response
Challenge Response
Signup and view all the flashcards
Digital Economy Act
Digital Economy Act
Signup and view all the flashcards
Data Protection Act
Data Protection Act
Signup and view all the flashcards
Computer Misuse Act
Computer Misuse Act
Signup and view all the flashcards
Acceptable Use Policy
Acceptable Use Policy
Signup and view all the flashcards
IP
IP
Signup and view all the flashcards
FTP
FTP
Signup and view all the flashcards
TCP
TCP
Signup and view all the flashcards
HTTP
HTTP
Signup and view all the flashcards
Web Browser
Web Browser
Signup and view all the flashcards
Backup
Backup
Signup and view all the flashcards
Recycle Bin
Recycle Bin
Signup and view all the flashcards
Phishing
Phishing
Signup and view all the flashcards
Study Notes
Music Downloading & Streaming
- Music can be downloaded or streamed with many sites offering short samples before purchase.
- Streaming allows listening or watching in real-time without downloading to a computer.
Website Components
- Websites utilize components for content (info, multimedia) as well as navigation components.
- Examples of components are:
- URL
- Navigation Bar
- Podcasts
- Web Browser
- RSS
Internet Service Providers (ISPs)
- ISPs provide Internet access via dial-up or broadband.
- Connections can be wired or wireless.
- Advantages of broadband over dial-up: give 2 advantages
- A disadvantage of wireless connections: Give 1
- An advantage of wired connections: Give 1
Email Communication
- Email improves communication in organizations and enables staff to share files
- Give 2 issues connected with sending and receiving email attachments.
Email Security
- Exercise responsibility and safety when using email.
- Examples of Email security threats are:
- Virus
- Hyperlink -.exe
Websites, Wikis and Educational Technology
- Websites provide a variety of information.
- Wikis are websites where users can edit content directly.
- VLE technology supports teaching through interactive resources in educational settings.
Networks (WAN, PAN, P2P, LAN)
- A network connects digital devices like computers and phones.
- WAN: Connects computers across different sites.
- PAN: Enables short-range connectivity to mobile devices.
- P2P: Enables devices to communicate without an access point..
- LAN: Connects computers within an office or building.
Communication Protocols
- Computer systems use protocols for communication.
- FTP enables the transfer of files over the Internet.
- HTTP is required in a website address (URL).
Internet Access & Software
- The Internet can be accessed on many devices.
- Specific software enables users to interact with the World Wide Web.
File Deletion & Data Management
- Deleted files remain on a hard drive until overwritten.
- Backup is essential to prevent data loss from disk failure.
- Recovery software restores deleted or corrupted files.
- The Recycle Bin temporarily stores deleted items from a computer hard drive.
Online Safety & Social Networking
- Social networks offer communication tools, including chat rooms and instant messaging.
- Phishing is a type of online fraud
- An Acceptable Use Policy dictates how technology/ the internet should be used within an organisation
- Exercise caution about disclosing personal information on social networking sites due to exposure from the internet.
- Bcc ensures the confidentiality of email recipients in multiple-recipient emails.
Online Accounts & Security
- Opening an online account typically involves completing a secure form.
- Secure forms make use of: Required field, Verification, Security Question, Challenge Response
Legislation & Online Safety
- Legislation should be kept up to date.
- The Data Protection Act protects personal data stored on computers.
- The Computer Misuse Act protects against unauthorized use of computer systems.
Real-Time Communication
- Real-time communication happens simultaneously for one or multiple users.
- A disadvantage of using Instant Messaging (IM) is to name 1:
- Web conferencing involves online meetings; give 1 advantage and 1 disadvantage.
Client-Side Processing
- Client-side processing uses examples.
Privacy & Electronic Communication Regulations
- The Privacy and Electronic Communications (EC Directive) Regulations 2003 prevents direct marketing without consent.
- Measures can be taken to reduce unwanted emails.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.