Untitled

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following describes streaming?

  • Saving a music file in `.wav` format.
  • Sharing films and videos online with many people.
  • Copying a file from the Internet to a computer for later viewing.
  • The ability to listen to media in real time without downloading. (correct)

Which two components are commonly found on a website to aid user experience?

  • Podcast
  • Navigation Bar (correct)
  • RSS
  • Web Browser
  • URL (correct)

State two advantages of using a broadband connection over a dial-up connection for internet access.

Faster speeds and always-on connectivity

What is one potential disadvantage of using a wireless internet connection?

<p>Security vulnerabilities</p> Signup and view all the answers

What is one advantage of using a wired internet connection?

<p>More stable connection</p> Signup and view all the answers

Give two potential issues related to sending and receiving email attachments.

<p>File size limitations and potential for viruses</p> Signup and view all the answers

Match the email security threat to its description:

<p>If you don't recognise or trust a sender's address = Virus</p> Signup and view all the answers

Using ______ in an email can hide recipients' addresses from each other for privacy.

<p>BCC</p> Signup and view all the answers

Which activity best exemplifies streaming?

<p>Listening to a sample of a song before buying it. (D)</p> Signup and view all the answers

Pay-to-use music download sites always offer full refunds if the downloaded track is of poor quality.

<p>False (B)</p> Signup and view all the answers

Besides listening to samples, name two other features commonly found on music download sites that help users decide what to purchase.

<p>Playing a track, user reviews</p> Signup and view all the answers

What is a primary benefit of streaming music over downloading music files?

<p>Streaming saves storage space on your device. (A)</p> Signup and view all the answers

A key advantage of using online music platforms is the ability to ______ music from various artists.

<p>discover</p> Signup and view all the answers

All music download services provide tracks in lossless audio formats.

<p>False (B)</p> Signup and view all the answers

In the context of online music, what is DRM and why is it used?

<p>Digital Rights Management, protect copyrights</p> Signup and view all the answers

Match each music service feature with its most appropriate description:

<p>Streaming = Listening to music without downloading the file Download = Saving a music file to your device Sample = Short preview before purchase Pay-to-use = Requires payment for access or ownership</p> Signup and view all the answers

Attached files with certain file extensions should not be opened unless you ______ the sender.

<p>trust</p> Signup and view all the answers

Which of the following website types allows information to be edited directly from a user's browser?

<p>Wiki (A)</p> Signup and view all the answers

Which technology is typically situated in an educational establishment to support learning and teaching via interactive online resources and guidance?

<p>VLE (D)</p> Signup and view all the answers

Match the network types with their correct descriptions:

<p>Enables devices to communicate without an access point = P2P A network used to connect computers across different sites and locations = WAN Enables connectivity over a short distance (short-range radio frequency) to mobile devices = PAN A network used to connect computers within an office or building = LAN</p> Signup and view all the answers

A PAN (Personal Area Network) is typically used to connect computers within an office building.

<p>False (B)</p> Signup and view all the answers

What is the general term for a standard method of communication between computer systems when performing tasks?

<p>protocol</p> Signup and view all the answers

Which of the following file extensions is generally considered safest to open without verifying the sender?

<p>.txt (A)</p> Signup and view all the answers

Opening email attachments from unknown senders is always a safe practice if your antivirus software is up to date.

<p>False (B)</p> Signup and view all the answers

Match the following protocols with their descriptions:

<p>IP = The core protocol for addressing and routing packets across networks. FTP = A standard network protocol used for the transfer of files between a client and server on a computer network. TCP = Provides reliable, ordered, and error-checked delivery of a stream of bytes between applications running on hosts communicating via an IP network. HTTP = The foundation of data communication for the World Wide Web.</p> Signup and view all the answers

Which software is essential for users to access and interact with the World Wide Web?

<p>Web Browser (B)</p> Signup and view all the answers

When a file is deleted from a computer, it is immediately and permanently removed from the hard drive, ensuring no possibility of recovery.

<p>False (B)</p> Signup and view all the answers

Match the following data management terms with their descriptions:

<p>Recovery = The process of attempting to restore deleted or corrupted files. Backup = Carried out regularly to ensure that data is not lost in the event of hard disk failure. Recycle Bin = Where items deleted from a computer hard drive are initially sent.</p> Signup and view all the answers

Define 'phishing' in the context of social networking and online security.

<p>Phishing is a deceptive technique used to trick individuals into revealing sensitive information, such as usernames, passwords, and credit card details, by disguising as a trustworthy entity in an electronic communication.</p> Signup and view all the answers

What is the purpose of an 'Acceptable Use Policy' (AUP) in an organization or institution?

<p>An Acceptable Use Policy (AUP) outlines the rules and guidelines for the proper and ethical use of technology resources, including computers, networks, and internet access, within an organization or institution.</p> Signup and view all the answers

To ensure the confidentiality of recipients when sending an email to multiple people, in which of the following fields should their email addresses be entered?

<p>Bcc: (D)</p> Signup and view all the answers

The protocol commonly used to transfer files over the Internet is called ______.

<p>FTP</p> Signup and view all the answers

In the context of email communication, which option describes sending a copy of an email to someone without the other recipients knowing?

<p>Bcc: Sends a blind carbon copy. (B)</p> Signup and view all the answers

When completing a secure online form, fields marked with an asterisk (*) typically indicate a ______ Field.

<p>Required</p> Signup and view all the answers

Match the type of legislation to its corresponding description:

<p>Data Protection Act = Protects personal data stored on a computer Computer Misuse Act = Protects against malicious damage or unauthorized use of a computer system Digital Economy Act = Addresses a wide range of digital issues, including copyright infringement Acceptable Use Policy = Guidelines for using technology within an organization</p> Signup and view all the answers

Which of the following is a potential disadvantage of using instant messaging (IM)?

<p>Can distract a user from studying or working (B)</p> Signup and view all the answers

Briefly explain the concept of web conferencing, and provide one advantage and one disadvantage.

<p>Web conferencing: Allows real-time interaction with multiple users via the internet, often including video, audio, and screen sharing. Advantage: Facilitates remote collaboration and meetings, reducing travel costs. Disadvantage: Requires a stable internet connection, and technical issues can disrupt meetings.</p> Signup and view all the answers

Explain, using examples, what is meant by client-side processing.

<p>Client-side processing: Running tasks on the user's computer instead of the server. Example: JavaScript code in a web browser validates form data before submission. Another example is displaying an interactive animation on a webpage.</p> Signup and view all the answers

The Acceptable Use Policy is related to protecting personal data stored on a computer.

<p>False (B)</p> Signup and view all the answers

Which option best describes 'real-time' communication?

<p>Communicating with one or multiple users simultaneously and instantly. (D)</p> Signup and view all the answers

Flashcards

Streaming

Watching media in real time without downloading.

Navigation Bar

A bar on a website aiding user movement.

URL

Address of a unique resource on the web.

Broadband Advantage

Faster internet than dial-up.

Signup and view all the flashcards

Wireless Disadvantage

Data transfer speed limitations.

Signup and view all the flashcards

Wired Connection

More stable & secure connection.

Signup and view all the flashcards

Email Attachment Issues

Viruses and large file sizes.

Signup and view all the flashcards

Virus (Email Security)

Malicious software disguised as something harmless.

Signup and view all the flashcards

Cookies

Small pieces of data stored on a user's computer by a website to remember information about the user. This is often used for tracking preferences or login information.

Signup and view all the flashcards

Spam

Unwanted or unsolicited electronic messages, especially advertising or promotional material, received through email or other digital communication channels.

Signup and view all the flashcards

Local Area Network (LAN)

A computer network that interconnects computers within a limited area such as a residence, school, laboratory, or office building. It allows devices to share resources like files and printers.

Signup and view all the flashcards

Data Transmission

The transmission of data over a network. It involves breaking down data into packets and sending them across the network to their destination.

Signup and view all the flashcards

Content Filter

A type of software that is designed to block or control certain content on the internet, often used to restrict access to inappropriate or harmful websites.

Signup and view all the flashcards

Firewall

A program or hardware that examines network traffic and either blocks it or allows it to pass, based on a set of rules. It protects a network from unauthorized access.

Signup and view all the flashcards

Protocol

A set of rules governing the format of data sent over a network, particularly the internet. Examples include TCP/IP, HTTP, and FTP.

Signup and view all the flashcards

Risky Attachments

Files with certain extensions shouldn't be opened if the sender is untrusted.

Signup and view all the flashcards

Wiki

A website that allows users to edit content directly from their web browser.

Signup and view all the flashcards

VLE (Virtual Learning Environment)

Technology in schools/colleges that supports learning through online resources.

Signup and view all the flashcards

P2P (Peer-to-Peer)

Enables devices to communicate directly without needing a central access point.

Signup and view all the flashcards

WAN (Wide Area Network)

A network that connects computers across different geographical sites and locations.

Signup and view all the flashcards

LAN (Local Area Network)

A network used to connect computers within a single office or building.

Signup and view all the flashcards

PAN (Personal Area Network)

Enables connectivity over a short distance to mobile devices.

Signup and view all the flashcards

Required Field

A field on a form that must be filled out before submission.

Signup and view all the flashcards

Verification

A method to confirm the user's identity when creating an account.

Signup and view all the flashcards

Security Question

A question used to verify identity when resetting a password.

Signup and view all the flashcards

Challenge Response

A security measure requiring a unique, dynamically generated code.

Signup and view all the flashcards

Digital Economy Act

UK law that addresses online copyright infringement and internet access.

Signup and view all the flashcards

Data Protection Act

UK law that protects personal information stored on computers.

Signup and view all the flashcards

Computer Misuse Act

UK law preventing unauthorized access or modification of computer systems.

Signup and view all the flashcards

Acceptable Use Policy

Rules specifying acceptable and unacceptable uses of technology within an organization.

Signup and view all the flashcards

IP

Internet Protocol: A set of rules governing how data is sent between computers on the internet.

Signup and view all the flashcards

FTP

File Transfer Protocol: A standard network protocol used for the transfer of computer files between a client and server on a computer network.

Signup and view all the flashcards

TCP

Transmission Control Protocol: A communications standard that enables application programs and computing devices to exchange messages over a network.

Signup and view all the flashcards

HTTP

Hypertext Transfer Protocol: The foundation of data communication for the World Wide Web.

Signup and view all the flashcards

Web Browser

Software that enables a user to display and interact with text, images, videos, music and other information typically located on a web page or website on the World Wide Web.

Signup and view all the flashcards

Backup

Making copies of data to protect against data loss or corruption.

Signup and view all the flashcards

Recycle Bin

A folder or directory that contains files and folders that have been deleted from a computer.

Signup and view all the flashcards

Phishing

A deceptive way to obtain sensitive information, like usernames, passwords, and credit card details, by disguising as a trustworthy entity in an electronic communication.

Signup and view all the flashcards

Study Notes

Music Downloading & Streaming

  • Music can be downloaded or streamed with many sites offering short samples before purchase.
  • Streaming allows listening or watching in real-time without downloading to a computer.

Website Components

  • Websites utilize components for content (info, multimedia) as well as navigation components.
  • Examples of components are:
    • URL
    • Navigation Bar
    • Podcasts
    • Web Browser
    • RSS

Internet Service Providers (ISPs)

  • ISPs provide Internet access via dial-up or broadband.
  • Connections can be wired or wireless.
  • Advantages of broadband over dial-up: give 2 advantages
  • A disadvantage of wireless connections: Give 1
  • An advantage of wired connections: Give 1

Email Communication

  • Email improves communication in organizations and enables staff to share files
  • Give 2 issues connected with sending and receiving email attachments.

Email Security

  • Exercise responsibility and safety when using email.
  • Examples of Email security threats are:
    • Virus
    • Hyperlink -.exe

Websites, Wikis and Educational Technology

  • Websites provide a variety of information.
  • Wikis are websites where users can edit content directly.
  • VLE technology supports teaching through interactive resources in educational settings.

Networks (WAN, PAN, P2P, LAN)

  • A network connects digital devices like computers and phones.
  • WAN: Connects computers across different sites.
  • PAN: Enables short-range connectivity to mobile devices.
  • P2P: Enables devices to communicate without an access point..
  • LAN: Connects computers within an office or building.

Communication Protocols

  • Computer systems use protocols for communication.
  • FTP enables the transfer of files over the Internet.
  • HTTP is required in a website address (URL).

Internet Access & Software

  • The Internet can be accessed on many devices.
  • Specific software enables users to interact with the World Wide Web.

File Deletion & Data Management

  • Deleted files remain on a hard drive until overwritten.
  • Backup is essential to prevent data loss from disk failure.
  • Recovery software restores deleted or corrupted files.
  • The Recycle Bin temporarily stores deleted items from a computer hard drive.

Online Safety & Social Networking

  • Social networks offer communication tools, including chat rooms and instant messaging.
  • Phishing is a type of online fraud
  • An Acceptable Use Policy dictates how technology/ the internet should be used within an organisation
  • Exercise caution about disclosing personal information on social networking sites due to exposure from the internet.
  • Bcc ensures the confidentiality of email recipients in multiple-recipient emails.

Online Accounts & Security

  • Opening an online account typically involves completing a secure form.
  • Secure forms make use of: Required field, Verification, Security Question, Challenge Response

Legislation & Online Safety

  • Legislation should be kept up to date.
  • The Data Protection Act protects personal data stored on computers.
  • The Computer Misuse Act protects against unauthorized use of computer systems.

Real-Time Communication

  • Real-time communication happens simultaneously for one or multiple users.
  • A disadvantage of using Instant Messaging (IM) is to name 1:
  • Web conferencing involves online meetings; give 1 advantage and 1 disadvantage.

Client-Side Processing

  • Client-side processing uses examples.

Privacy & Electronic Communication Regulations

  • The Privacy and Electronic Communications (EC Directive) Regulations 2003 prevents direct marketing without consent.
  • Measures can be taken to reduce unwanted emails.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Untitled
110 questions

Untitled

ComfortingAquamarine avatar
ComfortingAquamarine
Untitled
44 questions

Untitled

ExaltingAndradite avatar
ExaltingAndradite
Untitled
6 questions

Untitled

StrikingParadise avatar
StrikingParadise
Untitled Quiz
50 questions

Untitled Quiz

JoyousSulfur avatar
JoyousSulfur
Use Quizgecko on...
Browser
Browser