null
US
Entrar
Registre-se gratuitamente
Registre-se
Detectamos que o JavaScript não está habilitado no teu navegador. Habilite o Javascript para o funcionamento correto do nosso site. Por favor, leia os
Termos e Condições
para mais informações.
Próximo
Copiar e Editar
Você deve estar logado para concluir esta ação!
Inscreva-se gratuitamente
110620
Operating Online
Descrição
ICT Mapa Mental sobre Operating Online, criado por sinjinibasu.sb em 27-05-2013.
Sem etiquetas
ict
ict
Mapa Mental por
sinjinibasu.sb
, atualizado more than 1 year ago
Mais
Menos
Criado por
sinjinibasu.sb
mais de 11 anos atrás
48
1
0
Resumo de Recurso
Operating Online
The Internet
Communicating on the Internet
Email
Online Albums
VoIP
Instant Messaging
Blogs/ Social Networking
Need to set up with an Internet Service Provider (ISP)
Cost
Bandwidth
Download Limits
Email and web space
Security
Reliability and support
Business on the Internet
Email/ IM/ VoIP
Aid collaborations
Possibility of over-reliance or misuse
Cloud computing
Don't need to buy multiple software license
Possible security issures with data stored third party
Video Conferencing
Reduces need for travel so lowers costs
People don't communicate as well as face to face
Learning on the Internet
Virtual Learning Environment (VLE)
News Websites
Email, instant messaging, VoIP
User-generated websites
Security Measures
Security Questions
Challenge-response test
Capcha Test
Check that the form is not being completed automatically
Capchas are used to protect systems vulnerable to email spams
Personal Spaces
Rules
Don't post anything you don't want to make public
Minimise details that identify you or wherabouts
Keep account details private
Only add people you know
Don't use apps that use GPS functions to share location with people you dont know
Information Misuse
Spyware
Trojans record all of keystrokes or take pictures of screen
Find out personal or financial information to commit fraud
Firewalls prevent spyware being remotely downloaded
Install antispyware protection software
Be wary of downloading files
Identity theft
Phishing
Cookies
Small text files
Stored on computer and track what is done on the website
Legislation
The Data Protection Act 1998
Keep information secure
Not to keep data longer than necessary
Data accurate and up to date
Not to use data without consent
Not ask for more info than necessary
Data protection rights
Check any personal data an organisation holds
Incorrect information is amended
Data should not be used in a way to harm you
Info not used for direct marketing
Computer Misuse Act
Remotely log into a network or computer with intent to steal or corrupt data
Copyright, Designs and Patents Act
Protects people's original work from being used without permission
All original work is copyright and the person creating a work owns the copyright
Can use 'Creative Commons licences' to allow certain uses of their work
Cosequences
Proscuted
ISP may prevent you from using the internet
Prison
Quer criar seus próprios
Mapas Mentais
gratuitos
com a GoConqr?
Saiba mais
.
Semelhante
Types and Components of Computer Systems
Jess Peason
Input Devices
Jess Peason
Output Devices
Jess Peason
Networks
Will8324
General ICT Quiz
leahshaw
ICT Revison Flash Cards
Arun Johal
FLAT FILE VS RELATIONAL DATABASE
rosiejones
Online World - Learning Aim A
andysedge
Business Aims and ICT Strategies
scrt
User Interfaces
Skeletor
General ICT Quiz
Jade Fantom
Explore a Biblioteca