Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
42 Cards in this Set
- Front
- Back
Name heath risks and causes |
1) back and neck strains cause by sitting in front of a computer screen for long periods 2) RSI ( repetitive strain injury/ damage to fingers and wrist caused by continuous use of a keyboard or repitive clicking 3) eyestrain caused by staring at computer screen for too long 4) headaches caused by incorrect lightening, screen reflections 5) Ozone irritation caused by laser printers in an office area |
|
How to minimise the risk of back and neck strains (3) |
1) use adjustable chairs to give correct posture 2) use foot rest to reduce posture problems 3) use screens that can be titled |
|
How to reduce RSI |
1) ensure correct posture is maintained 2) take regular breaks 3) use voice activated software if the user if probs to problems when using mouse and keyboard 4) male proper use of a wrist rest when using a mouse |
|
How to reduce eyestrain (4) |
1) take breaks 2) make use of anti glare screens 3) no screen flicker 4) test your eyes fresh |
|
How to reduce headaches |
1) take breaks 2) use anti glare screens 3) test eyes regularly |
|
How to reduce ozone irritation (3) |
1) proper ventilation to remove ozone gas 2) laser printers should be stored in a designated printer room 3) change to other type of printers |
|
Name safety risks (4) |
1) electrocution 2) trailing wires 3) heavy equipment falling 4) fire risks |
|
User good habits to keep safety |
1) check the state of the wire, making sure fits not damaged 2) drinks are far away a from the computer 3) don’t cover computer with paper or fabric since it can block ventilation holes 4) don’t plus too many electric outlet socket 5) make sure to excercise |
|
What’s e safety |
It refers to safety when using the internet |
|
What’s personal data |
Any data concerning a living person who can be indifferent from the data itself |
|
How to ensure e safety |
1) don’t give out personal information to people unlined 2) don’t send photos of yourself 3)always maintains your privacy settings on every device you use 4) make sure the websites visutrwd can be trusted with the https 5) only email people you know 6)only open email from known sources |
|
E safety methods using social network |
1) use a nickname 2) keep private data secret 3) blot anybody who acts suspicious 4) use appropriate language 5) avoid the misuse of images |
|
Risks of online gaming |
1) can create violence 2) cyberbullying 3) cyber attracts on a users computer phone |
|
What’s hacking |
The act of gaining unauthorised access to a computer system |
|
Dangers of spyware |
1) Gives the originator access to all data entered using a keyboard 2) can change users deafualt browse |
|
How to prevent spyware |
1) anitspyware risk 2) clues that they keyboard is being monitored 3) selection of a drop down menu can reduce risk |
|
What can hacking lead to |
1) identify theft or the misuse of personal info 2) data can be deleted or changed in a users computer |
|
How to prevent hacking |
1) use firewalls 2) use strong password which are frequently changes |
|
Def of phishing |
This is sending of a legitimate looking email to target users. As soon as the recipient to clicks on a link in the email, they’re a sent to a fake website where they fooled into giving personal data |
|
Dangers of phishing |
1) the creator of the email can gain personal data 2) it can lead to fraud |
|
How to prevent phishing |
1) be careful when open emails 2) web browsers filter out phishing emails |
|
What’s pharming |
This is a code installed on a users computer. This code will be redirected the user to a fake website without the user knowing |
|
Dangers of pharming |
1) gain of personal data 2) fraud or identity theft |
|
How to prevent pharming |
1) anti spyware can identify and remove pharming codes form a users computer 2) users should look out for Clues that they’re being connected to a secure website |
|
Def of spyware |
A software that gathers data by monitoring key presses on the users keyboard. The fathers data is then sent back to the person who sent the software |
|
Dangers of spyware (2) |
1) Gives the originator access to all data entered using a keyboard on the users computer 2) it can changes users default page and read cookie data |
|
Describe the use of a cookie |
The codes which are stored on a users computer, are sent by a web server to a user’s computer. Once the cookie has been read by the code on the web server, the data can be retrieved and used to customise the web page for each individual. These are referees to a user preference. |
|
What’s an anonymous user profile |
This is the data gathered by cookies |
|
Adv of cookie (2) |
1) removed the need of storing massive amounts of data 2) can used to customise the web server of the user |
|
What’s a fire wall |
This is either a firewall or software which sits between the users computer and external network and filters information coming in and out of the users computer |
|
Tasks done by a firewall (5) |
1) checks if the incoming or outgoing data meets a given criteria 2) criteria can be set to prevent access to certain undesirable sites 3) prevents hackers of gaining access to the users computer ( by blocking the IP) 4) helps prevent viruses 5) examine the traffic between the internal network and the public network |
|
What’s a gateway |
The firewall can also be a hardware that is located between the computer and the internet connection |
|
A firewall can’t prevent which circumstances |
1) employee carelessness cannot be controlled by the firewalls 2) if a user chooses to disable the fire wall, it will leav the open open to harmful traffic from the internet |
|
How to prevent spyware |
1) install an anti-spyware 2) the user should check for cluster that their keyboard is being monitored 3) when selecting a password select characters from a drop down menu can reduce risk |
|
Def of virus |
A program code that can replicate itself with the intention of deleting or corrupting files on a computer |
|
Dangers of viruses (3) |
1) software can corrupt files 2) it depleted files on a compute 3) viruses can cause the computer to slow down or stop functioning |
|
How to prevent viruses (3) |
1) anti virus software 2) don’t use software from unknown sources 3) be careful when opening emails from unknown senders |
|
What is a spam |
It’s a junk email send out to a recipient who is on a mailing list |
|
How to prevent spam |
1) don’t sign up for commercial mailing lists 2) dont reply to an email from a mailing list 3) look out for check box which are already selected when items are bought 4) block images in HTML messages that spammers use as web beacons |
|
What are web beacons |
This are graphic images linked to an external web server that is placed to verify that your email address is valid when the message is opened |
|
What’s a moderated forum? Name on advantages |
This is an online discussion forum in which all the posts are checked by an administrator before they’re allowed to be posted. It filter out posts which are rude or offensive |
|
Def of a cookie |
These are small files or codes that are stored on a users computer. |