No student devices needed. Know more
60 questions
How do you access online accounts?
Access via internet browser, then enter username and password
Log into account
Enter cloud website
2 advantages of cloud computing
Available 24/7
Automatic updates
Easy to access
Optional backups
2 advantages of cloud storage
Pay for what you use
Expensive
Automatic backups
Easy to maintain
What should be in a password policy
Should include lower and uppercase
Should include symbols
Should be something easy to remember
You don't need to change it
Advantages of social media
Large number of users
Everyone uses it
Easy to use
Can target certain groups of people
Disadvantages of social media
Negative comments and posts
Can have a conversation with customers
Need to learn how to use
Could gain useful feedback
How are websites transmissions secured
HTTPS / SSL
HTTP / SSL
HTML
VPN
How does 2FA work
Login to account using username and password, you will then receive a code via email or TXT to enter before you can login
You enter a PIN code
You use your password and fingerprint
2 Website accessibility features
Text to speech
Speech to text
Good colour contrast
Use Siri
How can a team use cloud storage facilities
Can work on the same document at the same time
Can post comments and edits
Can email easily
Can access from anywhere
Advantages of remote working
Lots of free time
Dont need to commute/travel
Can work around other commitments and appointments
Better work life balance
Disadvantages of remote working
Can get distracted easily
Can feel alone
Relies on internet connection
Better work life balance
What is a cookie
Small data file which stores user information
Used to spy on you
A computer bug that you need to remove
Advantages or cookies
Store login information
Track your location
Give you personal adverts
Disadvantages of cookies
Track your internet habits and searches
Store your information
Steal your information
What is ransomware?
Steals information from your computer
Locks and encrypts your computer and asks for money
Robs you
Gives you back your data once you pay
What does DDOS do?
Flood a server with requests causing it to go offline
Stops you from accessing the internet
Makes your website crash
What is phishing?
Getting your dinner to go with some chips
Looking for information
Gathering personal information for fraudulent use
3 topics found in an AUP?
Acceptable use policy
Use of passwords
Use of email and internet
Scope (Who it applies to)
What does this symbol represent?
Input
Output
Process
Decision
What does this symbol represent?
Input
Input / Output
Process
Output
What does this symbol represent?
Input
Output
Process
Decision
What is a type of ad-hoc network?
Bluetooth
WiFi
Hotspot
Mobile Network (3G, 4G)
How can you protect your intellectual property?
Copyright
TM
(R)
What type of hacker might be employed by a company?
White Hat Hacker
Black Hat Hacker
What type of hacker would not be employed by a company?
White Hat Hacker
Black Hat Hacker
Ways to make a website accessible?
Make a special version of the website
The site allows users to change the text size
Use contrasting colours
Make use of larger buttons
Why is it important to provide equal access to services and information?
Net Neutrality
Accessibility
Equal Access
Data Protection Act
What actions would you take following an attack?
Investigate
Respond
Manage
Resolve
Analyse
What should you do after a phishing attack?
Report the incident
Explain what has been given away
Delete the email
Hide it and hope nothing happens
3 Types of file access on a computer system
Read Access
Write Access
Full Control
Staff
Admin
How has modern technology changed team work?
Shared Calendars
Collaborative planning
Remote working
Emails
How could you reduce the environmental impact of computers and technology?
Turn off equipment when not in use
Reduce paper use and printing
Use sleep modes
Lock the device when not in use
What is collaboration?
Can work anywhere, anytime, at the same time
Email and sharing documents quickly
Cloud computing
Automatic backups of data and documents
What does this symbol represent?
Process
Data Store
External Entity
Data Flow
What does this symbol represent?
Process
Data Store
External Entity
Data Flow
What does this symbol represent?
Process
Data Store
External Entity
Data Flow
What does this symbol represent?
Process
Data Store
External Entity
Data Flow
2 Threats of paying through a website
Personal details stolen
ID theft
Get hacked
Don't get items
2 ways to secure a website
HTTPS
Padlock Symbol
HTTP
SSL
How can you prevent files from being deleted?
Setting permission / access rights
Password them
Train staff
Don't tell them where the file is
A company wants to pass alone some of your personal details, what should they do to comply with Data Protection?
Just send them, it will be ok
Send them and tell you about it
Ask for consent to send them
What are 2 internal threats to a company?
Staff passing confidential information on
Visiting untrustworthy websites
Misuse of equipment
Getting hacked and viruses
2 Benefits of biometric systems
Verification time is quick
No way to replicate a retina
Cant replicate them
Net Neutrality
Treats everyone and all services as equal
Stops you paying more
Fair service provided
How could you save power?
Screensaver
Switch screen off after certain time
Shutdown computer at a certain time
Switch it off when you have finished using it
2 Ways to connect to the internet at home
Open WiFi
Hotspot
Bluetooth
PAN
2 Ways you get a virus?
Sharing of files that havent been checked
Download files from internet
Open a email
Having a firewall
Types of Malware?
Worms
Ransomware
Spyware
Virus
2 Collaboration tools
Shared documents
Live chat / VOIP
Talking to them
How can you help protect the environment?
Use less paper, store files electronically
Recycle old equipment and pass it onto others in need
Dont buy anything new
Plant some more trees
2 Rules to include in a password policy
Must include letters and numbers
Must be grater than 8 characters
Must be memorable
Must always be the same
2 Accessibility features for an online form
Increase font size
Larger buttons
Easy to see
Someone to help them fill it in
Impacts of a data breach
Damage public image
Company fined or prosecuted
People wont trust them
How can you restrict access
Change user access to files
Read / Write permissions
2 FA
2 Advantages of Social Media for a Business
Can access a wide target audience
Can talk in real time or be quick with responces
Easy to use
Everyone has it
1 drawback of cloud storage
Relies on internet
Free to use
Anyone can access
2 Ways to secure a webpage?
HTTP
HTTPS
Password stared out ***
CAPTCHA
2 way to protect intellectual property
Trade Mark
Copyright
Plagirism
Data Protection Law
Communication tools
Shared calendars
VOIP
Social media
Explore all questions with a free account