Bits & Bytes
PIPEDA
Computer Security
Presentations
#nptech
100
Define creative commons
Creative Commons licence allows for various forms of sharing of material (including music, photos, graphic) without explicit permission.
100
What does PIPEDA stand for?
Personal Protection and Electronic Documents Act
100
What is the difference between a virus and a worm?
A computer virus is a computer program that can copy itself and infect a computer. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or devour files on a targeted computer.
100
What is Slideshare?
SlideShare is the world's largest community for sharing presentations. Upload and share on blogs, Twitter, Facebook or LinkedIn. Over 60 million people use SlideShare every month for research, sharing ideas, connecting with others, and generating business leads. SlideShare also supports documents, PDFs, and videos
100
What is an internet filter bubble?
a phenomenon in which websites use algorithms to selectively guess what information a user would like to see based on information about the user like location, past click behaviour and search history. As a result websites tend to show only information which agrees with the user's past viewpoint. Prime examples are Google's personalized search results and Facebook's personalized news stream. According to Pariser, users get less exposure to conflicting viewpoints and are isolated intellectually in their own informational bubble.
200
Define "all rights reserved."
All rights reserved means that the material is copyrightede and that a user does not have permission to use the material without explicit and written consent.
200
Define implied consent.
Consent that can be inferred either through an ongoing relationship or through reasonable expectation. For example, consent could be implied for continuing to send a regular mail donor direct mail solicitations or for using the return address on a donation cheque to send a donor a receipt for income tax purposes.
200
What is the point of a firewall?
A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all (in and out) computer traffic between different security domains based upon a set of rules and other criteria. Firewalls can be implemented in either hardware or software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. A firewall acts as a barrier between your home computer and the internet. It can help screen out unauthorized access and can log attempts to enter your system. A firewall will help protect from inbound attacks, but they can do little or nothing to detect e-mails containing viruses or block spyware and adware – programs that can send data from your computer to the outside world.
200
What is a prezi?
Prezi is a cloud-based presentation software that opens up a new world between whiteboards and slides. The main feature of prezi is the zoomable canvas
200
What is delicious?
Delicious is a social bookmarking site.
300
What does RSS stand for?
Real Simple Syndication
300
Define express consent
Permission that is explicitly sought and applied to the collection, use or disclosure of information, particularly for sensitive information (i.e. health information) or when there has been a significant change from the original purpose for which information was collected. For example, where an organization has a long-standing practice of not sharing its mailing list(s) and has taken the decision to change the practice, seeking express consent is advisable.
300
What is a cookie (in relation to computers)?
A cookie is a small piece of text stored on a user's computer by a web browser. A cookie consists of one or more name-value pairs containing bits of information such as user preferences, shopping cart contents, the identifier for a server-based session, or other data used by websites. A cookie is a text file that can collect and store information about you on the hard drive of your computer, such as what web pages you've visited. Many sites use cookies as a way to track visitor information. Cookies are stored to help sites speed future access and customize information for you. Since a cookie "remembers" your preferences, it can save you time. But some people consider the use of cookies an invasion of privacy.
300
List 3 things that make a presentation visually attractive.
stunning images colour scheme adding slight rotation to text
300
List 3 ways that technology can help a not for profit
single, holistic view of donors relationship management analysis reporting accountability & stewardship online donor services direct mail pledge management recurring gifts matching gifts saving time
400
Define open source software
Open-source software (OSS) is computer software that is available in source code form: the source code and certain other rights normally reserved for copyright holders are provided under a software license that permits users to study, change, improve and at times also to distribute the software.
400
What is considered commercial activity?
As defined in PIPEDA commercial activity is: “any particular transaction, act or conduct or any regular course of conduct that is of commercial character, including the selling, bartering or leasing of donor, membership or other fundraising lists.” There is not a precise list of exactly what transactions would fall under the definition of commercial activity. You can expect the federal privacy commissioner and the courts to further develop the list of activities covered by the legislation.
400
What is spyware?
Spyware is a type of malware that is installed on computers and that collects information about users without their knowledge. The presence of spyware is typically hidden from the user. Typically, spyware is secretly installed on the user's personal computer. Sometimes, however, spywares such as keyloggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users. Spyware programs can collect various types of personal information, such as Internet surfing habits and sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software and redirecting Web browser activity. Spyware is known to change computer settings, resulting in slow connection speeds, different home pages, and/or loss of Internet or functionality of other programs.
400
What should one consider in relation to text within a powerpoint presentation?
less is more. use one font, or if you are going to use 2-3, ensure that they are part of the same family of fonts.
400
What are 3 top trends in technology in the not for profit?
online presence social networking mobilization peer-to-peer fundraising donor empowered fundraising interactive stewardship
500
What is the difference between Google Alerts and Google Reader?
Google alerts are typically based on key words. When those key words are used anywhere on the internet, an email is delivered to your inbox with the link. Google Reader is a RSS Reader and "alerts" you when a subscribed blog, news site or othe website has updated content.
500
Outline the difference between personal and public information.
Personal information is information that can be used to identify, distinguish or contact a specific individual? Information usually found on a business card or that which can be found in the public domain is considered publicly available information.
500
What is phishing?
In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail or instant messaging,[1] and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Even when using server authentication, it may require tremendous skill to detect that the website is fake.
500
In the presentation "Steal this presentation", the presenter states that most important to remember about good design in presentations is: C.R.A.P. What does C.R.A.P. stand for?
C = contrast R = repetition (colours, fonts, images) A = alignment (text and images should be visually connected) P = proximity (related elements are grouped together)
500
What is prospect research.
Prospect research locates potential donors (individuals, corporations, foundations) who have the capacity to give a generous gift and who have a strong affinity to your organization. The mission of prospect research is to use the first philanthropic dollar raised to secure more philanthropic dollars in the form of major gifts.