Computing Y7 Term 1 Flashcards

(38 cards)

1
Q

What is a Password?

A

A mixture of letters, numbers and special characters

Passwords are essential for securing accounts and personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does AUP stand for?

A

Acceptable Use Policy

AUP outlines the acceptable behaviors and practices for using a service or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is E-Mail?

A

An electronic way of communication

E-Mail is widely used for personal and professional correspondence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define E-Mail Etiquette.

A

How you type your email — respectful, formal, etc.

Proper etiquette ensures clear and professional communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are E-Mail Attachments?

A

The files that you or others add to an e-mail

Attachments can include documents, images, and other file types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Folder Structure refer to?

A

The way and order that you save your files in; it should be organised and easy to find things through

A good folder structure enhances file management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Cyberbullying.

A

Bullying through online platforms

Cyberbullying can have serious emotional and psychological effects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Trolling?

A

Leaving insulting messages online

Trolls often seek to provoke or upset others for amusement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does Stalking mean in an online context?

A

Illegally following or watching someone for an excessive amount of time

Online stalking can lead to serious safety concerns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List some effects of cyberbullying.

A
  • Depression
  • Low self-esteem
  • Low self-confidence
  • Suicidal thoughts

These effects can be long-lasting and severe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What should you do with Online Strangers?

A

Ignore emails from people you don’t know in real life

This helps protect personal information and safety.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Location Settings?

A

Using GPS, many social media platforms track your real-life location

Proper management of location settings is crucial for privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the dangers of location settings?

A

People you don’t know might stalk you due to your location settings not being properly set

Always review location settings to maintain safety.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define Malware.

A

Malicious software, which means harmful files

Malware can cause significant damage to devices and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Virus?

A

Harms your computer in some way, usually by altering, deleting or corrupting files

Viruses can spread through downloads and email attachments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Trojan?

A

Starts by posing as a trusted application, but gains unauthorized access when the user runs the application

Trojans can lead to data theft and system compromise.

17
Q

What are Worms?

A

Difficult to get rid of; they copy themselves over networks to external devices

Worms can cause widespread damage across networks.

18
Q

Define Spyware.

A

Collects information from your computer and sends it to someone else

Spyware can compromise personal privacy and security.

19
Q

What is Scareware?

A

Tricks you into thinking it’s vital software that you must buy

Scareware preys on fear to manipulate users into purchasing.

20
Q

What is Phishing?

A

A scam that poses as a big company, trying to trick people into thinking that it’s a legit brand

Phishing often involves fake emails or websites.

21
Q

What is Targeted Advertising?

A

A way for businesses to try to sell people a specific product which matches what they are interested in

This practice uses data analytics to tailor marketing efforts.

22
Q

What does SPAM refer to?

A

Spam emails offer a vast variety of things, from money to deals that are too good to be true

SPAM can clutter inboxes and pose security risks.

23
Q

What is a Spam filter?

A

Recognises common spam emails and stops them from getting through to your actual inbox

Spam filters help maintain a clean and safe email environment.

24
Q

What is Anti-Software Virus?

A

Stops malware from attacking your digital device

Anti-virus software is essential for protecting devices from threats.

25
What is **Sexting**?
Consensual and non-consensual sharing of nude and semi-nude images and video ## Footnote Receiving nude or semi-nude pictures under 18 is illegal.
26
Define **Online reputation**.
The opinion other people online have about you, e.g. your posts, replies and content ## Footnote Online reputation can significantly impact personal and professional life.
27
What is a **Digital Footprint**?
A trail of data that you create while surfing the internet ## Footnote It includes the websites you visit, the emails and content that you post and more.
28
What does **Harassment** involve?
Sending nasty messages or comments to others ## Footnote Online harassment can lead to severe emotional distress.
29
What are the **4C’s**?
* Content: what you’re posting or sending * Contact: harmful interactions * Conduct: online behaviour * Commerce: online transactions ## Footnote The 4C's framework helps in understanding online safety.
30
What is **Illegal Content**?
THEFT, GRAPHIC CONTENT, CYBERCRIMES AND HARASSMENT ## Footnote Engaging with illegal content can lead to serious legal consequences.
31
Define **Identity and Data Theft**.
When data is taken without consent; is used for illegal purposes ## Footnote This can lead to financial loss and personal security issues.
32
What are **Scams**?
Online scams which use many methods: phishing, to take people’s sensitive information ## Footnote Scams can result in significant financial and personal loss.
33
What is **Hacking**?
Using digital devices to gain people’s details, usually for financial gain ## Footnote Hacking poses a serious threat to personal and organizational security.
34
Define **Hate Speech**.
Using offensive, abusive or threatening language due to racist reasons ## Footnote Hate speech can lead to social unrest and legal action.
35
What is **Grooming**?
When someone tries to build a relationship with a young person ## Footnote Grooming is often a precursor to exploitation or abuse.
36
AI
AI stands for Artificial Intelligence — it refers to machines or software that can perform tasks that normally require human intelligence, such as learning, problem-solving, decision-making, and understanding language or images.
37
2 dangers of AI
Bias AI systems can reflect unfair or discriminatory patterns if trained on biased data. Privacy AI can collect and analyze personal data, sometimes without clear consent, leading to privacy risks.
38
2 Advantages of AI
Efficiency AI can automate repetitive tasks, saving time and effort. Personalization AI can tailor recommendations, like music or shopping, based on your preferences.