Explain what is meant by the term software copyright
IGCSE Theory Notes
Section 6: The Effects of Using ICT
|Explain what is meant by the term software copyright. (2) |
|When someone creates an original piece of software the protection they have from the law that prevents someone from copying it is |
|called software copyright. |
|Four things that copyright law prevents people from doing? (4) |
|Copy |
|Lend |
|Rent |
|Install on a network |
|Define the term computer virus. (2) |
|A computer virus is a piece of software that can 'infect' a computer (install itself) and copy itself to other computers, without |
|the users knowledge or permission. |
|Six measures to protect against computer viruses. (6) |
|Anti-virus |
|Anti-malware |
|Don’t download anything that is not from a trusted source |
|Don’t open email attachments |
|Don’t click hyperlinks in websites |
|Scan memory sticks before using them |
|Don’t use cracked software |
|Define the term hacking. (2) |
|Breaking in to a computer system or accessing data without prior authorization. |
|Three different types of measure that can be taken to protect computer systems from hackers plus an example of each (6) |
|Use strong passwords, for example a mixture of letters, numbers and symbols, not too short, and not a word in the dictionary. |
|Don’t reveal your password to anyone. |
|Use firewall software, which is often free for personal use. |
|Disconnect from networks when not using them. |
|Encrypt any sensitive information. |
|Four types of job in which ICT has led to a decrease in employment (8) |
|Manufacturing: Automated production lines and computer-controlled robots have replaced human workers. |
|Secretarial work: Specialists are no longer required to produce documents because it is possible to type and print documents using |
|a computer with word processing software. |
|Accounting: Specialists are no longer required to do financial calculations because it is possible to do this type of work with a |
|computer and spreadsheet software. |
|Printing: Printers and typesetters are now obsolete because of DTP (desktop publishing) and computer-controlled printing presses. |
|Four types of job in which ICT has led to a increase in employment (8) |
|IT technicians: Maintain and fix hardware and software. |
|Computer programmers: Create new computer applications. |
|Web designers: Create and maintain new websites. |
|Help-desk staff: Answer support calls from and give advice to users. |
|Two advantage and two disadvantages of using computers for work (4) |
|Advantage: Repetitive tasks done quickly. |
|Advantage: More pleasant jobs for humans. |
|Disadvantage: Overdependence. System outages can prevent work from being done. |
|Disadvantage: Ability to work at home can mean longer hours and lack of home life. |
|Define microcontroller (2) |
|A microcontroller is a microprocessor which is embedded into and manages everyday electronic devices. |
|Three components of a microcontroller (3) |
|CPU |
|ROM |
|RAM |
|Why might a microcontroller require an ADC? (4) [Quite a hard question but should be possible if you were paying attention to the |
|analogue vs digital lesson] |
|An ADC is an analogue-to-digital converter. It allows computer systems to collect and store information from sensors, which collect|
|analogue information. An example of this would be a modern oven. Sensors in the oven measure the temperature in the oven. This is |
|analogue data and it has to be converted to digital data by the ADC before the oven’s microcontroller can process it. Once it is |
|converted to digital form the microcontroller can make a decision as to whether to increase or decrease the temperature. |
|Why might a microcontroller require a DAC? (4) |
|A DAC is a digital-to-analogue converter. It allows a computer system to output analogue data, such as sound or light. An example |
|of this is an MP3 player. Music is stored in digital form on the MP3 player’s disk. The DAC converts this to an analogue sound |
|signal which is sent to the headphones. |
|Four effects of microprocessor-controlled devices on our lives: |
|Labour-saving, so more leisure time. |
|Easier communication using mobile devices. |
|Products and services can be ordered online. |
|Greater freedom for those whose mobility is restricted, such as the elderly. |
|Provide definitions for each of the following |
|(give examples for each except Web 2.0): |
|Web 2.0 |Not really a new version of the web but an acknowledgement that the way we use the web|
| |has changed, much of the content and taxonomy now being supplied by the users rather |
| |than by specialist web masters. |
|Blog |Short for web-log. An online diary or commentary that people use to keep others |
| |updated with their news. |
|Digital media uploading |The use of the internet to store personal photos, music or video, e.g. Flickr, |
| |Napster. |
|Wiki |A special type of website that allows its users to create and edit its content. They |
| |are often used for collaborative projects. |
|Social networking |An online community in which users share information according to their common |
| |interests, e.g. school, hometown, political affiliation. Examples are Facebook and |
| |Twitter. |
|Three ways to make sure the information you find on the internet is reliable: |
|Check several sources. |
|Use websites that you know and trust. |
|Check the spelling and grammar of the site. Reputable websites are more likely to be correct. |
|Four ways to avoid undesirable content on the internet: |
|Use web content filtering software. |
|Use the “safe search” option in your search engine. |
|Don’t click the links in spam email. |
|Be careful which search terms you use. |
|Two ways to make sure the web page you are accessing is secure: |
|Check that the URL begins with https, not just http. |
|Look for a padlock icon somewhere in your browser window. |
|Provide definitions for the following |
|Phishing |In a phishing attack an email is sent to the target with a fake URL to a site that seems reputable, like |
| |a bank. The fake site is designed to look genuine and it asks the target to enter his/her username and |
| |password. These details are then recorded by the fake site and can subsequently be used by the attackers |
| |to gain access to personal data. |
|Pharming |More sophisticated than phishing, pharming is an attack on a DNS (domain name service) server, which |
| |causes internet traffic to be routed to a fake website. The fake website then harvests usernames and |
| |passwords. |
|Spam |Unwanted, usually commercial email. |
|Above is a screenshot of an email I received recently. |
|What type of attack is this an example of? (1) |
|Phishing |
|Describe why I should not press the “show images” button (4) |
|The image will be hosted on the attackers’ server. When you click “show images”, your browser will make a request of that server. |
|This request will be logged in the server’s http log and the attackers will then know that your email address is a “live” address |
|(ie someone is actively using it). They will then prioritise your email address when sending spam and you will receive even more |
|unwanted email. |
|Your friend, who does not study ICT, tells you that it’s ok to click the link because it says “https” at the beginning. Is she |
|right? Explain. (4) |
|She is totally wrong. The text of the link is absolutely independent of the actual URL that the link will take you to. Consider |
|this piece of html: |
| |
|This link says that it goes to a secure bank website, but in fact it is going to some unknown IP address. |
|Three potential health problems, together with causes and methods of prevention |
|Potential health problem |Cause |Prevention |
|Eye strain |Looking at a monitor for extended periods|Take regular breaks |
|Back pain |Bad posture when sitting at the computer |Use an ergonomic chair, take breaks |
|Repetitive Strain Injury (RSI) |Typing for extended periods |Use a wrist support and an ergonomic |
| | |keyboard |
|Four types of accident along with methods of preventing them: |
|Fire |Do not overload power sockets. Use circuit breakers and keep fire extinguishers near. |
|Heavy object falling |Make sure computers are sited on strong tables. |
|Trip |Don’t leave trailing cables across walkways. Put them under carpets or in proper cable |
| |ducts. |
|Electric shock |Keep liquids away from computer equipment. |
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related searches
- what is meant by philosophy
- what is meant by significance
- what is homc with the heart
- what is meant to be quotes
- what is meant to be
- what is meant by a negative correlation
- what is meant by network
- historians explain what is history
- what is produced by photosynthesis
- what is meant by the economic problem
- what is meant by market economy
- which is guaranteed by the fifth amendment