Explain what is meant by the term software copyright



IGCSE Theory Notes

Section 6: The Effects of Using ICT

|Explain what is meant by the term software copyright. (2) |

|When someone creates an original piece of software the protection they have from the law that prevents someone from copying it is |

|called software copyright. |

|Four things that copyright law prevents people from doing? (4) |

|Copy |

|Lend |

|Rent |

|Install on a network |

|Define the term computer virus. (2) |

|A computer virus is a piece of software that can 'infect' a computer (install itself) and copy itself to other computers, without |

|the users knowledge or permission. |

|Six measures to protect against computer viruses. (6) |

|Anti-virus |

|Anti-malware |

|Don’t download anything that is not from a trusted source |

|Don’t open email attachments |

|Don’t click hyperlinks in websites |

|Scan memory sticks before using them |

|Don’t use cracked software |

|Define the term hacking. (2) |

|Breaking in to a computer system or accessing data without prior authorization. |

|Three different types of measure that can be taken to protect computer systems from hackers plus an example of each (6) |

|Use strong passwords, for example a mixture of letters, numbers and symbols, not too short, and not a word in the dictionary. |

|Don’t reveal your password to anyone. |

|Use firewall software, which is often free for personal use. |

|Disconnect from networks when not using them. |

|Encrypt any sensitive information. |

|Four types of job in which ICT has led to a decrease in employment (8) |

|Manufacturing: Automated production lines and computer-controlled robots have replaced human workers. |

|Secretarial work: Specialists are no longer required to produce documents because it is possible to type and print documents using |

|a computer with word processing software. |

|Accounting: Specialists are no longer required to do financial calculations because it is possible to do this type of work with a |

|computer and spreadsheet software. |

|Printing: Printers and typesetters are now obsolete because of DTP (desktop publishing) and computer-controlled printing presses. |

|Four types of job in which ICT has led to a increase in employment (8) |

|IT technicians: Maintain and fix hardware and software. |

|Computer programmers: Create new computer applications. |

|Web designers: Create and maintain new websites. |

|Help-desk staff: Answer support calls from and give advice to users. |

|Two advantage and two disadvantages of using computers for work (4) |

|Advantage: Repetitive tasks done quickly. |

|Advantage: More pleasant jobs for humans. |

|Disadvantage: Overdependence. System outages can prevent work from being done. |

|Disadvantage: Ability to work at home can mean longer hours and lack of home life. |

|Define microcontroller (2) |

|A microcontroller is a microprocessor which is embedded into and manages everyday electronic devices. |

|Three components of a microcontroller (3) |

|CPU |

|ROM |

|RAM |

|Why might a microcontroller require an ADC? (4) [Quite a hard question but should be possible if you were paying attention to the |

|analogue vs digital lesson] |

|An ADC is an analogue-to-digital converter. It allows computer systems to collect and store information from sensors, which collect|

|analogue information. An example of this would be a modern oven. Sensors in the oven measure the temperature in the oven. This is |

|analogue data and it has to be converted to digital data by the ADC before the oven’s microcontroller can process it. Once it is |

|converted to digital form the microcontroller can make a decision as to whether to increase or decrease the temperature. |

|Why might a microcontroller require a DAC? (4) |

|A DAC is a digital-to-analogue converter. It allows a computer system to output analogue data, such as sound or light. An example |

|of this is an MP3 player. Music is stored in digital form on the MP3 player’s disk. The DAC converts this to an analogue sound |

|signal which is sent to the headphones. |

|Four effects of microprocessor-controlled devices on our lives: |

|Labour-saving, so more leisure time. |

|Easier communication using mobile devices. |

|Products and services can be ordered online. |

|Greater freedom for those whose mobility is restricted, such as the elderly. |

|Provide definitions for each of the following |

|(give examples for each except Web 2.0): |

|Web 2.0 |Not really a new version of the web but an acknowledgement that the way we use the web|

| |has changed, much of the content and taxonomy now being supplied by the users rather |

| |than by specialist web masters. |

|Blog |Short for web-log. An online diary or commentary that people use to keep others |

| |updated with their news. |

|Digital media uploading |The use of the internet to store personal photos, music or video, e.g. Flickr, |

| |Napster. |

|Wiki |A special type of website that allows its users to create and edit its content. They |

| |are often used for collaborative projects. |

|Social networking |An online community in which users share information according to their common |

| |interests, e.g. school, hometown, political affiliation. Examples are Facebook and |

| |Twitter. |

|Three ways to make sure the information you find on the internet is reliable: |

|Check several sources. |

|Use websites that you know and trust. |

|Check the spelling and grammar of the site. Reputable websites are more likely to be correct. |

|Four ways to avoid undesirable content on the internet: |

|Use web content filtering software. |

|Use the “safe search” option in your search engine. |

|Don’t click the links in spam email. |

|Be careful which search terms you use. |

|Two ways to make sure the web page you are accessing is secure: |

|Check that the URL begins with https, not just http. |

|Look for a padlock icon somewhere in your browser window. |

|Provide definitions for the following |

|Phishing |In a phishing attack an email is sent to the target with a fake URL to a site that seems reputable, like |

| |a bank. The fake site is designed to look genuine and it asks the target to enter his/her username and |

| |password. These details are then recorded by the fake site and can subsequently be used by the attackers |

| |to gain access to personal data. |

|Pharming |More sophisticated than phishing, pharming is an attack on a DNS (domain name service) server, which |

| |causes internet traffic to be routed to a fake website. The fake website then harvests usernames and |

| |passwords. |

|Spam |Unwanted, usually commercial email. |

|Above is a screenshot of an email I received recently. |

|What type of attack is this an example of? (1) |

|Phishing |

|Describe why I should not press the “show images” button (4) |

|The image will be hosted on the attackers’ server. When you click “show images”, your browser will make a request of that server. |

|This request will be logged in the server’s http log and the attackers will then know that your email address is a “live” address |

|(ie someone is actively using it). They will then prioritise your email address when sending spam and you will receive even more |

|unwanted email. |

|Your friend, who does not study ICT, tells you that it’s ok to click the link because it says “https” at the beginning. Is she |

|right? Explain. (4) |

|She is totally wrong. The text of the link is absolutely independent of the actual URL that the link will take you to. Consider |

|this piece of html: |

| |

|This link says that it goes to a secure bank website, but in fact it is going to some unknown IP address. |

|Three potential health problems, together with causes and methods of prevention |

|Potential health problem |Cause |Prevention |

|Eye strain |Looking at a monitor for extended periods|Take regular breaks |

|Back pain |Bad posture when sitting at the computer |Use an ergonomic chair, take breaks |

|Repetitive Strain Injury (RSI) |Typing for extended periods |Use a wrist support and an ergonomic |

| | |keyboard |

|Four types of accident along with methods of preventing them: |

|Fire |Do not overload power sockets. Use circuit breakers and keep fire extinguishers near. |

|Heavy object falling |Make sure computers are sited on strong tables. |

|Trip |Don’t leave trailing cables across walkways. Put them under carpets or in proper cable |

| |ducts. |

|Electric shock |Keep liquids away from computer equipment. |

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download