0% found this document useful (0 votes)
25 views

Cheat Sheet For ICT T4 Assessment

Textbook Term 4 GBA exam cheat sheet for ict
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
25 views

Cheat Sheet For ICT T4 Assessment

Textbook Term 4 GBA exam cheat sheet for ict
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 2
Data protection protocols:protocoles that help keep user data safe. Companies must make sure Info is:used In a Way that Is adequate relevant¬ excessive accurate/kept for no longer than is absolutely necessary/handled according to people's data protection rights/kept safe and secure/not transferred outside the EEA without adequate Protection. Under the DPA individuals whose data is stored by organisations have the right to: object to decisions that are taken by automated means/have inaccurate personal data rectified, blocked, erased or destroyediciaim compensation for damages caused by a breach of the Aciaccess a copy of the information comprised of their personal data |Copyright legislation/distrepution rights:Copyright is a legal power that provides the lcreator of an original work with the sole authority to use and distribute it. {Copyright owners can choose to distribute their works under licences that lusers must pay for, such as when buying a music track or an app Copyright owners can also {choose to cistribute their works undertree licences such as open source or Creative [Commons licences, which allow the owner to distribute their work without payment lExemption from copyright applies in some situations. an example of this is fair use. [some examples of fair use are: coples of books made by libraries/educational lestablishments, museums recordings of broadcasts non-commercial research or when used lin parody. Monitering individuals:Digital technologies can be used to monitor individuals. This has benefits but it can also have significant drawbacks and Is considered controversial. Individuals movements can be monitored using many methods: closed circuit televisior (CCTVjwhich sometimes uses facial recognition software/automatic number plate recognition(ANPR)cameras used by law enforcement agencies such as the police/ monitoring the use of identification cards, travel cards, passports at borders and bank card transactions.Benefits:find people who are lost, especially young children/iocate nearby friends in order to arrange to meet socially identify people on networks/keep travellers safe, such by checking for potential crime at airports/verify individuals for financial transactions in order to reduce financial crime. Drawbacks:compromising people's privacy the expense of setting up,monitoring and maintaining systems/ energy consumption of the systems and the effect on the environment/making people feel as though they are not trusted. SUSTAINABILITY ISSUE ed Power ‘The power is produced using non- Using renewable energies requirements of renewable energies, which reduce * Using more energy-efficient digital devices _the planet's natural resources. devices ‘* Building data centres next to rivers to make use of natural hydro-electric power Use of poisonous When devices are thrown away, * Education substances such these chemicals leak out and can» ‘Recycling schemes as bromine, cause health risks to people's ‘+ Laws, such as the EU's Waste mercury and cardiovascular and central nervous Electrical and Electronic chlorine in digital systems and to wildlife; they may Equipment Directive devices also cause cancer and lung disease» Using harmless alternative materials for components Uo /SBniyoIe ‘SISWIES| J9UJO PUB S9YdeS) Woy Loddns at -ssa00e 0} S!ausea| Moje Sasunoo Bi sal|s ma|nai Uo ajdoad Jauj0 40 yeIs doys ‘s1aworsno Aq sBuyes oud sjonpoid auyjuonduosap ronpoid enonpoid ety Jo aBew! ue:210)s Ud anBo[ee9 sy, 0uas8)a1 pue sjeuinol auyjuo yo saue ‘anBoje}e9 jonpoid e asn Kay) ‘auljuc sdoys sasn e uayM “sionpoud poueUy Jeyjo pue sueO| J0) BurA|dde/siajsueN pue sjueWuAed Bupjewys}ole eoueleq Sunes seoueled Sunoaus :Bulnnioul ‘seoinlas eulluo AUEW SJaWOIsNd JIBUl Jeo SHURE, {transactional data data that is sent between digital devices track collect and analyse data cookies information that a website leaves on a user's computer so that the website will recognise that userwhen they use it again. enerypt protect information by putting it into a lspecial code that only some people can read. An online transaction ocours whenever data Is sent between devices on the intemet. Some of this transactional data can be tracked online by network devices. This data is stored in cookies. It is possible to encrypt cookies when they are transferred between devices online Examples of data that can be stored as cookies include:the time and date of the transaction/IP addressesithe referring lwebsite/items added to the user's online shopping basket/buttons pressed by the user Cookies serve various functions in web browsing. They help websites remember user preferences, track activity for analytics and advertising, and facilitate authentication to keep users logged in. However, their use raises privacy and security concerns regarding tracking and profiling without user consent, sparking debates about their regulation. Online entertainment and leisure encompass a wide range of activities. Examples include streaming services like Netflix and Spotify, social media platforms such as Facebook and Instagram, online gaming platforms like Steam and Xbox Live, and content-sharing sites lke] YouTube and Twitch. These platforms offer various forms of entertainment and relaxation, catering to different interests and preferences. Laws regarding cookies govern their usage and protection of user data on the internet. Examples Include the GDPR (General Data Protection Regulation) In the European Union, which mandates explicit user consent for cookie usage and requires websites to provide clear information about their use of cookies. Similarly, the CCPA (California Consumer Privacy Act) in the United States gives users the right to opt out of the sale of their personal information, including data collected through cookies. These laws aim to enhance user v nsure transparency in onl User-generated sites are platforms where users create and share content. Examples Include social media sites like Facebook, Twitter, and Instagram, where users post updates, photos, and videos; content-sharing platforms like YouTube and TikTok, where users upload and share thelr own videos; and community-driven forums like Reddit and Quora, where users engage in discussions and share knowledge on various topics. These sites empower users to contribute their own content, fostering communities and enabling diverse forms of expression and interaction online. Cookies can be utilized to display relevant information to users by storing their preferences land browsing history. Websites can use cookies to remember user settings, such as language preferences or customized layouts, ensuring a personalized experience upon return visits. Additionally, cookies can track user activity and interests, enabling websites to display targeted content or recommendations based on their browsing behavior. For lexample, an e-commerce site can use cookies to suggest products similar to those previously viewed by the user. By leveraging this data, cookies help tallor the user lexperience, providing content that is more likely to be of interest and relevance to individual users. [Encryption is a method used to secure sensitive data by converting it into an unreadable |format that can only be decrypted with the appropriate key or password, It ensures lconfidentiality and protects information from unauthorized access or interception during Iransmission or storage. Examples of encryption techniques include symmetric encryption, |where the same key is used for both encryption and decryption, and asymmetric encryption, |which involves using a pair of keys: a public key for encryption and a private key for ldecryption. Encryption is crucial for safeguarding data privacy and security in various. lapplications such as online transactions, communication, and data storage. a a FSO GETS DAI RT ORRATEG> LomadjosauNnyA spoyoUANONLOU RAMA, DSPAN = slonequruauno pur staan RascHNOUe) SPAN = ‘uaurte ap pen, eniduouoena oj uoneanent ‘snap ay + sumjanns + weywoyvomaog + Jeyew g swopaaiy 0s» ano aane00

You might also like