Explain what is meant by the term software copyright

advertisement
IGCSE Theory Notes
Section 6: The Effects of Using ICT
Explain what is meant by the term software copyright. (2)
When someone creates an original piece of software the protection they have
from the law that prevents someone from copying it is called software copyright.
Four things that copyright law prevents people from doing? (4)
Copy
Lend
Rent
Install on a network
Define the term computer virus. (2)
A computer virus is a piece of software that can 'infect' a computer (install itself)
and copy itself to other computers, without the users knowledge or permission.
Six measures to protect against computer viruses. (6)
Anti-virus
Anti-malware
Don’t download anything that is not from a trusted source
Don’t open email attachments
Don’t click hyperlinks in websites
Scan memory sticks before using them
Don’t use cracked software
Define the term hacking. (2)
Breaking in to a computer system or accessing data without prior authorization.
Three different types of measure that can be taken to protect computer systems
from hackers plus an example of each (6)
Use strong passwords, for example a mixture of letters, numbers and symbols,
not too short, and not a word in the dictionary.
Don’t reveal your password to anyone.
Use firewall software, which is often free for personal use.
Disconnect from networks when not using them.
Encrypt any sensitive information.
Four types of job in which ICT has led to a decrease in employment (8)
Manufacturing: Automated production lines and computer-controlled robots
have replaced human workers.
Secretarial work: Specialists are no longer required to produce documents
because it is possible to type and print documents using a computer with word
processing software.
Accounting: Specialists are no longer required to do financial calculations
because it is possible to do this type of work with a computer and spreadsheet
software.
Printing: Printers and typesetters are now obsolete because of DTP (desktop
publishing) and computer-controlled printing presses.
Four types of job in which ICT has led to a increase in employment (8)
IT technicians: Maintain and fix hardware and software.
Computer programmers: Create new computer applications.
Web designers: Create and maintain new websites.
Help-desk staff: Answer support calls from and give advice to users.
Two advantage and two disadvantages of using computers for work (4)
Advantage: Repetitive tasks done quickly.
Advantage: More pleasant jobs for humans.
Disadvantage: Overdependence. System outages can prevent work from being
done.
Disadvantage: Ability to work at home can mean longer hours and lack of home
life.
Define microcontroller (2)
A microcontroller is a microprocessor which is embedded into and manages
everyday electronic devices.
Three components of a microcontroller (3)
CPU
ROM
RAM
Why might a microcontroller require an ADC? (4) [Quite a hard question but
should be possible if you were paying attention to the analogue vs digital lesson]
An ADC is an analogue-to-digital converter. It allows computer systems to
collect and store information from sensors, which collect analogue information.
An example of this would be a modern oven. Sensors in the oven measure the
temperature in the oven. This is analogue data and it has to be converted to
digital data by the ADC before the oven’s microcontroller can process it. Once it
is converted to digital form the microcontroller can make a decision as to
whether to increase or decrease the temperature.
Why might a microcontroller require a DAC? (4)
A DAC is a digital-to-analogue converter. It allows a computer system to output
analogue data, such as sound or light. An example of this is an MP3 player.
Music is stored in digital form on the MP3 player’s disk. The DAC converts this
to an analogue sound signal which is sent to the headphones.
Four effects of microprocessor-controlled devices on our lives:
Labour-saving, so more leisure time.
Easier communication using mobile devices.
Products and services can be ordered online.
Greater freedom for those whose mobility is restricted, such as the elderly.
Provide definitions for each of the following
(give examples for each except Web 2.0):
Web 2.0
Not really a new version of the web but an
acknowledgement that the way we use the web has
changed, much of the content and taxonomy now
being supplied by the users rather than by specialist
web masters.
Blog
Short for web-log. An online diary or commentary
that people use to keep others updated with their
news.
Digital media uploading
The use of the internet to store personal photos,
music or video, e.g. Flickr, Napster.
Wiki
A special type of website that allows its users to
create and edit its content. They are often used for
collaborative projects.
Social networking
An online community in which users share
information according to their common interests, e.g.
school, hometown, political affiliation. Examples are
Facebook and Twitter.
Three ways to make sure the information you find on the internet is reliable:
Check several sources.
Use websites that you know and trust.
Check the spelling and grammar of the site. Reputable websites are more likely
to be correct.
Four ways to avoid undesirable content on the internet:
Use web content filtering software.
Use the “safe search” option in your search engine.
Don’t click the links in spam email.
Be careful which search terms you use.
Two ways to make sure the web page you are accessing is secure:
Check that the URL begins with https, not just http.
Look for a padlock icon somewhere in your browser window.
Provide definitions for the following
Phishing
In a phishing attack an email is sent to the target with a fake
URL to a site that seems reputable, like a bank. The fake site is
designed to look genuine and it asks the target to enter his/her
username and password. These details are then recorded by the
fake site and can subsequently be used by the attackers to gain
access to personal data.
Pharming
More sophisticated than phishing, pharming is an attack on a
DNS (domain name service) server, which causes internet traffic
to be routed to a fake website. The fake website then harvests
usernames and passwords.
Spam
Unwanted, usually commercial email.
Above is a screenshot of an email I received recently.
What type of attack is this an example of? (1)
Phishing
Describe why I should not press the “show images” button (4)
The image will be hosted on the attackers’ server. When you click “show
images”, your browser will make a request of that server. This request will be
logged in the server’s http log and the attackers will then know that your email
address is a “live” address (ie someone is actively using it). They will then
prioritise your email address when sending spam and you will receive even
more unwanted email.
Your friend, who does not study ICT, tells you that it’s ok to click the link
because it says “https” at the beginning. Is she right? Explain. (4)
She is totally wrong. The text of the link is absolutely independent of the actual
URL that the link will take you to. Consider this piece of html:
<a href=”http://201.43.3.212/login.asp”>https://online.lloydstsb.co.uk</a>
This link says that it goes to a secure bank website, but in fact it is going to some
unknown IP address.
Three potential health problems, together with causes and methods of
prevention
Potential health problem
Cause
Prevention
Eye strain
Looking at a monitor for Take regular breaks
extended periods
Back pain
Bad posture when
Use an ergonomic chair,
sitting at the computer
take breaks
Repetitive Strain Injury
Typing for extended
Use a wrist support and
(RSI)
periods
an ergonomic keyboard
Four types of accident along with methods of preventing them:
Fire
Do not overload power sockets. Use circuit breakers
and keep fire extinguishers near.
Heavy object falling
Make sure computers are sited on strong tables.
Trip
Don’t leave trailing cables across walkways. Put
them under carpets or in proper cable ducts.
Electric shock
Keep liquids away from computer equipment.
Download