Computer Security Risks & Etiquettes

LaudableDiscernment avatar
LaudableDiscernment
·
·
Download

Start Quiz

Study Flashcards

42 Questions

Which of the following is a recommended practice for taking care of your computer?

Avoiding clutter around the computer

What should you do if the weather or atmosphere is too hot for your computer?

Turn off the computer

Which of the following is a precaution to take when installing programs on your computer?

Install programs one at a time

Which of the following is a recommended practice for taking care of your computer?

Disinfecting the keyboard with alcohol wipes

What should you do if the weather or atmosphere is too hot for your computer?

Turn off the computer unit

Which of the following is a precaution to take when installing programs on your computer?

Beware of viruses

Which of the following is NOT a recommended practice for taking care of your computer?

Cluttering up the space around the computer

Which of the following is NOT a precaution to take when installing programs on your computer?

Install multiple programs simultaneously

Always keep your computer free from ______, grime, and all kinds of dirt. The keyboard should be disinfected with alcohol wipes.

dust

Place your computer, speaker, scanner, and printer atop of a ______ surface. Slightly cold weather is ideal for computers. If the weather or atmosphere is too hot, turn off your computer unit.

sturdy

Avoid cluttering up the space around the ______.

computer

True or false: It is important to keep your computer free from dust, grime, and dirt?

True

True or false: The keyboard should be disinfected with alcohol wipes?

True

True or false: Cluttering up the space around the computer is recommended?

False

Match the following tips with their respective categories:

Do not flame others = Respecting others Place your computer on a sturdy surface = Taking care of your computer Install programs one at a time = Avoiding potential issues Beware of viruses = Computer safety

Match the following actions with their purposes:

Disinfecting the keyboard with alcohol wipes = Keeping the computer clean Turning off the computer in hot weather = Preventing overheating Avoid cluttering up the space around the computer = Maintaining a clean workspace Respecting other people's privacy = Promoting a respectful online environment

Match the following statements to their implications:

Slightly cold weather is ideal for computers = Computers function better in cooler environments Always keep your computer free from dust, grime, and all kinds of dirt = Cleanliness is important for computer maintenance Do not flame others = Online discussions should be respectful Beware of viruses = Computers are susceptible to malicious software

Match the terms with its definition.

Computer security risk = is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability Cybercrime = an online or Internet based illegal act Biometric device = it authenticates a person's identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer Hardware Theft = the act of stealing computer equipment

A malicious software that affects a computer negatively by altering the way the computer works.

Virus

A malicious software that copies itself repeatedly, using up resources and possibly shutting down the computer or network.

Worm

A malicious program that hides within or looks like a legitimate program.

Trojan Horse

A program that hides in a computer and allows someone from a remote location to take full control.

Rootkit

Which of the following is NOT a symptom of an infected computer due to an internet and network attack.

The operation system runs smoothly as usual.

You can start a computer with any removable media inserted in the drives or ports.

False

Always open an email attachment regardless if it's not from a trusted source.

False

Set the macro security in programs so that you can enable or disable macros.

True

Install an antivirus program on all your computer and update it regularly.

True

Scan the media device for malware before using it.

True

Stay informed about new virus alerts and virus hoaxes.

True

Match the terms and its definition.

Firewall = hardware and/or software that protects a network's resources from intrusion Unauthorized access = the use of a computer or network without permission Unauthorized use = the use of a computer or its data for unapproved or possibly illegal activities. Hardware Vandalism = the act of defacing or destroying computer equipment

What are the security measures that we can do to help reduce the chances of hardware theft and vandalism?

  1. Physical acccess controls
  2. Alarm Systems
  3. Cables to lock equipment
  4. Real time location system
  5. Passwords, possessed objects and biometrics

This occurs when someone intentionally erases programs, steals software media, illegally copies a program or illegally registers or activates a program.

Match the terms with its definition.

Information Theft = occurs when someone steals personal or confidential information Encryption = a process of converting readable data into unreadable characters to prevent unauthorized access. System Failure = the prolonged malfunction of a computer. Backup = a duplicate of a file, program, or disk that can be used if the original is lost, damage or destroyed. It is usually stored in a location separate from the computer site.

The process of using a wireless internet connection of someone else without their permission or knowledge.

Wireless Piggybacking

An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.

Ergonomics

Computer Ethics are the moral guidelines that govern the use of computers and information systems.

True

The widespread use of computers has led to health concerns like Repetitive Strain Injury (RSI) and Computer Vision Syndrome (CVS).

True

Give examples of Hand Exercises

Enumerate the techniques to ease eyestrain.

Match the terms and their definitions.

Intellectual Property Rights = the rights to which creators are entitled for their work Copyright = protects any tangible form of expression. IT code of conduct = a written guideline that helps determine whether a specific computer action is ethical or unethical. Information Privacy = refers to the right of individuals and companies to deny or restrict the collection and use of information about them.

It is an unsolicited email message or newsgroup posting.

A scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and financial information.

Taking Care of Your Computer: Learn essential tips to keep your computer in top shape, including cleaning techniques, optimal placement, and temperature considerations. Ensure your computer's longevity and performance while staying safe and respectful of others.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser