null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
110620
Operating Online
Description
ICT Mind Map on Operating Online, created by sinjinibasu.sb on 27/05/2013.
No tags specified
ict
ict
Mind Map by
sinjinibasu.sb
, updated more than 1 year ago
More
Less
Created by
sinjinibasu.sb
over 11 years ago
48
1
0
Resource summary
Operating Online
The Internet
Communicating on the Internet
Email
Online Albums
VoIP
Instant Messaging
Blogs/ Social Networking
Need to set up with an Internet Service Provider (ISP)
Cost
Bandwidth
Download Limits
Email and web space
Security
Reliability and support
Business on the Internet
Email/ IM/ VoIP
Aid collaborations
Possibility of over-reliance or misuse
Cloud computing
Don't need to buy multiple software license
Possible security issures with data stored third party
Video Conferencing
Reduces need for travel so lowers costs
People don't communicate as well as face to face
Learning on the Internet
Virtual Learning Environment (VLE)
News Websites
Email, instant messaging, VoIP
User-generated websites
Security Measures
Security Questions
Challenge-response test
Capcha Test
Check that the form is not being completed automatically
Capchas are used to protect systems vulnerable to email spams
Personal Spaces
Rules
Don't post anything you don't want to make public
Minimise details that identify you or wherabouts
Keep account details private
Only add people you know
Don't use apps that use GPS functions to share location with people you dont know
Information Misuse
Spyware
Trojans record all of keystrokes or take pictures of screen
Find out personal or financial information to commit fraud
Firewalls prevent spyware being remotely downloaded
Install antispyware protection software
Be wary of downloading files
Identity theft
Phishing
Cookies
Small text files
Stored on computer and track what is done on the website
Legislation
The Data Protection Act 1998
Keep information secure
Not to keep data longer than necessary
Data accurate and up to date
Not to use data without consent
Not ask for more info than necessary
Data protection rights
Check any personal data an organisation holds
Incorrect information is amended
Data should not be used in a way to harm you
Info not used for direct marketing
Computer Misuse Act
Remotely log into a network or computer with intent to steal or corrupt data
Copyright, Designs and Patents Act
Protects people's original work from being used without permission
All original work is copyright and the person creating a work owns the copyright
Can use 'Creative Commons licences' to allow certain uses of their work
Cosequences
Proscuted
ISP may prevent you from using the internet
Prison
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
Types and Components of Computer Systems
Jess Peason
Input Devices
Jess Peason
Output Devices
Jess Peason
Networks
Will8324
General ICT Quiz
leahshaw
ICT Revison Flash Cards
Arun Johal
FLAT FILE VS RELATIONAL DATABASE
rosiejones
Online World - Learning Aim A
andysedge
Business Aims and ICT Strategies
scrt
User Interfaces
Skeletor
General ICT Quiz
Jade Fantom
Browse Library