Intro. to Computers Module 6

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Describe how Encryption works

The process of "scrambling" information in such a way that it cannot be read unless the use possesses the "key" to unlock it back to a readable format (decryption)

Identify how to protect personal info collected by legitimate institutions

•Give only necessary information when completing an online form or a warranty or rebate card •Review the information that online sites have stored about you •Request to be removed from mailing lists •Create another email account to use when a merchant or website requires an address •Don not use your social media account login information to log in to another site

Identify in regards to privacy, which is a best practice

•Shred financial documents and paperwork that contain personal information •Do not carry a Social Security number in a wallet or write it on a check •Do not provide personal information either over the phone or through an email message •Keep personal information in a secure location in a home or apartment •Be cautious about what information is posted on social networking sites and who can view your information. Show "limited friends" a reduced version of profile •Keep only last three months of most recent financial statements and shred old documents. For paper documents that must be retained, use a scanner to create a PDF with a strong password •Give cautions consideration before giving permission to a website or app request to collect data •Use common sense

Identify what a DIGITAL CERTIFICATE is

A technology used to verify a user's identity and key that has been "signed" by a trusted third party

Identify how a hacker can execute malware using a script

An add-on might allow your computer to download a "script" or series of instructions that commands the browser to perform specific actions

Identify how which browser security setting to allows and which to not

Cookies, scripting, plug-ins, pop-ups, clear browsing data, plug-in validation

Identify the term data backup

Copying files from a computer's hard drive that are then stored in a remote location

True or False: "To prevent a laptop from being stolen, you can use a surge protector."

False

True or False: "To protect your information and to help you to remember passwords, use your social media account login information to log into another site."

False

True or False: A Trojan is a malicious program that uses a computer network to replicate.

False

Identify what it is called, when an attacker convinces you to enter in personal info at a fake website after receiving an email from a person pretending to be a bank employee

Identify Theft

Identify situation in which a digital certificate is useful

Make it possible to verify the identity of a user and the user's key to prevent an attack from someone impersonating the user

Identify how the discarding of old computer in a landfill have an effect on the environment

Results in a large amount of e-waste, the toxic metals may eventually contaminate the ground and water supply *gold, palladium, platinum, copper, mercury, and lead

Identify how to protect a computer from electrical surges

Surge protector

Identify to what technology can lead to EXCEPT

Technology addiction •Sedentary lifestyle result in too little time for physical activity •Psychological development such as poor self-confidence, anxiety, depression, lower emotional stability, and even lower life satisfaction •Social interaction may hinder social skill development or even cause social withdrawal

Identify an example of cyberbullying

The use of technology to stalk another person through email, text messages, phone calls, and other forms of communication

Identify how the system of biometrics is used in a hospital setting

Uses the characteristics of your face, hands, voice, or eyes to authenticate you

Differentiate between a worm and a trojan

Worm is malicious program that uses computer network to replicate, network viruses Trojan is malware that hides inside another program, often one downloaded from the web

True or false: "Social networking sites have a history of providing tight security and giving users a clear understanding of how security features work."

false

Identify what would NOT BE included as an attack risk on a Wi-Fi Network

•Reading wireless transmission •Viewing or stealing computer data •Injecting malware •Downloading harmful content


Set pelajaran terkait

Nutrition Chapter 9: Plant-Based Diets

View Set

MH Module 8- Substance Related and Addictive Disorders

View Set

EC 340 International Trade Agreements (Unit 7)

View Set

Test on the Industrial Revolution, Capitalism, Socialism, Reform

View Set

Psychology 251 Chapter 4 Classification, Diagnosis, and Assessment

View Set

Anatomy & Physiology Chapter 1-2 Study Guide

View Set

Зарубіжна література

View Set