Computer Security Risks & Etiquettes
42 Questions
4 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is a recommended practice for taking care of your computer?

  • Leaving your computer in a dusty environment
  • Disinfecting the keyboard with water
  • Avoiding clutter around the computer (correct)
  • Placing your computer on an unstable surface
  • What should you do if the weather or atmosphere is too hot for your computer?

  • Turn off the computer (correct)
  • Keep the computer running
  • Increase the cooling fan speed
  • Move the computer to a colder room
  • Which of the following is a precaution to take when installing programs on your computer?

  • Install multiple programs simultaneously
  • Install programs one at a time (correct)
  • Install programs without reading the terms and conditions
  • Install programs from untrusted sources
  • Which of the following is a recommended practice for taking care of your computer?

    <p>Disinfecting the keyboard with alcohol wipes</p> Signup and view all the answers

    What should you do if the weather or atmosphere is too hot for your computer?

    <p>Turn off the computer unit</p> Signup and view all the answers

    Which of the following is a precaution to take when installing programs on your computer?

    <p>Beware of viruses</p> Signup and view all the answers

    Which of the following is NOT a recommended practice for taking care of your computer?

    <p>Cluttering up the space around the computer</p> Signup and view all the answers

    Which of the following is NOT a precaution to take when installing programs on your computer?

    <p>Install multiple programs simultaneously</p> Signup and view all the answers

    Always keep your computer free from ______, grime, and all kinds of dirt. The keyboard should be disinfected with alcohol wipes.

    <p>dust</p> Signup and view all the answers

    Place your computer, speaker, scanner, and printer atop of a ______ surface. Slightly cold weather is ideal for computers. If the weather or atmosphere is too hot, turn off your computer unit.

    <p>sturdy</p> Signup and view all the answers

    Avoid cluttering up the space around the ______.

    <p>computer</p> Signup and view all the answers

    True or false: It is important to keep your computer free from dust, grime, and dirt?

    <p>True</p> Signup and view all the answers

    True or false: The keyboard should be disinfected with alcohol wipes?

    <p>True</p> Signup and view all the answers

    True or false: Cluttering up the space around the computer is recommended?

    <p>False</p> Signup and view all the answers

    Match the following tips with their respective categories:

    <p>Do not flame others = Respecting others Place your computer on a sturdy surface = Taking care of your computer Install programs one at a time = Avoiding potential issues Beware of viruses = Computer safety</p> Signup and view all the answers

    Match the following actions with their purposes:

    <p>Disinfecting the keyboard with alcohol wipes = Keeping the computer clean Turning off the computer in hot weather = Preventing overheating Avoid cluttering up the space around the computer = Maintaining a clean workspace Respecting other people's privacy = Promoting a respectful online environment</p> Signup and view all the answers

    Match the following statements to their implications:

    <p>Slightly cold weather is ideal for computers = Computers function better in cooler environments Always keep your computer free from dust, grime, and all kinds of dirt = Cleanliness is important for computer maintenance Do not flame others = Online discussions should be respectful Beware of viruses = Computers are susceptible to malicious software</p> Signup and view all the answers

    Match the terms with its definition.

    <p>Computer security risk = is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability Cybercrime = an online or Internet based illegal act Biometric device = it authenticates a person's identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer Hardware Theft = the act of stealing computer equipment</p> Signup and view all the answers

    A malicious software that affects a computer negatively by altering the way the computer works.

    <p>Virus</p> Signup and view all the answers

    A malicious software that copies itself repeatedly, using up resources and possibly shutting down the computer or network.

    <p>Worm</p> Signup and view all the answers

    A malicious program that hides within or looks like a legitimate program.

    <p>Trojan Horse</p> Signup and view all the answers

    A program that hides in a computer and allows someone from a remote location to take full control.

    <p>Rootkit</p> Signup and view all the answers

    Which of the following is NOT a symptom of an infected computer due to an internet and network attack.

    <p>The operation system runs smoothly as usual.</p> Signup and view all the answers

    You can start a computer with any removable media inserted in the drives or ports.

    <p>False</p> Signup and view all the answers

    Always open an email attachment regardless if it's not from a trusted source.

    <p>False</p> Signup and view all the answers

    Set the macro security in programs so that you can enable or disable macros.

    <p>True</p> Signup and view all the answers

    Install an antivirus program on all your computer and update it regularly.

    <p>True</p> Signup and view all the answers

    Scan the media device for malware before using it.

    <p>True</p> Signup and view all the answers

    Stay informed about new virus alerts and virus hoaxes.

    <p>True</p> Signup and view all the answers

    Match the terms and its definition.

    <p>Firewall = hardware and/or software that protects a network's resources from intrusion Unauthorized access = the use of a computer or network without permission Unauthorized use = the use of a computer or its data for unapproved or possibly illegal activities. Hardware Vandalism = the act of defacing or destroying computer equipment</p> Signup and view all the answers

    What are the security measures that we can do to help reduce the chances of hardware theft and vandalism?

    <ol> <li>Physical acccess controls</li> <li>Alarm Systems</li> <li>Cables to lock equipment</li> <li>Real time location system</li> <li>Passwords, possessed objects and biometrics</li> </ol> Signup and view all the answers

    This occurs when someone intentionally erases programs, steals software media, illegally copies a program or illegally registers or activates a program.

    Signup and view all the answers

    Match the terms with its definition.

    <p>Information Theft = occurs when someone steals personal or confidential information Encryption = a process of converting readable data into unreadable characters to prevent unauthorized access. System Failure = the prolonged malfunction of a computer. Backup = a duplicate of a file, program, or disk that can be used if the original is lost, damage or destroyed. It is usually stored in a location separate from the computer site.</p> Signup and view all the answers

    The process of using a wireless internet connection of someone else without their permission or knowledge.

    <p>Wireless Piggybacking</p> Signup and view all the answers

    An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.

    <p>Ergonomics</p> Signup and view all the answers

    Computer Ethics are the moral guidelines that govern the use of computers and information systems.

    <p>True</p> Signup and view all the answers

    The widespread use of computers has led to health concerns like Repetitive Strain Injury (RSI) and Computer Vision Syndrome (CVS).

    <p>True</p> Signup and view all the answers

    Give examples of Hand Exercises

    Signup and view all the answers

    Enumerate the techniques to ease eyestrain.

    Signup and view all the answers

    Match the terms and their definitions.

    <p>Intellectual Property Rights = the rights to which creators are entitled for their work Copyright = protects any tangible form of expression. IT code of conduct = a written guideline that helps determine whether a specific computer action is ethical or unethical. Information Privacy = refers to the right of individuals and companies to deny or restrict the collection and use of information about them.</p> Signup and view all the answers

    It is an unsolicited email message or newsgroup posting.

    Signup and view all the answers

    A scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and financial information.

    Signup and view all the answers

    Study Notes

    Computer Care Practices

    • Keep computers free from dust, grime, and dirt to ensure optimal performance and longevity.
    • Disinfect keyboards with alcohol wipes to reduce the risk of germs and contaminants.
    • Place computers and peripherals on flat, stable surfaces to prevent overheating and damage.
    • Turning off the computer during excessively hot weather prevents overheating and possible hardware failure.
    • Clutter around the computer should be avoided to ensure proper ventilation and a safe working environment.

    Software Installation Precautions

    • Only download and install programs from trusted sources to minimize the risk of malware.
    • Always scan removable media for malware before use to protect the computer system.
    • Regularly update antivirus software and perform system scans to detect and prevent infections.
    • Enable macro security settings to control macro functionality and protect against potentially harmful code.

    Malware Types and Effects

    • Malware can alter system functionality, causing negative effects on a computer.
    • Some malware can replicate itself, consuming resources and crippling system performance.
    • Certain malicious programs disguise themselves as legitimate software to trick users.
    • Remote access Trojans allow unauthorized users to control a computer remotely.

    Symptoms of a Computer Infection

    • Unusual slowdowns, crashes, or unexpected behavior may indicate an infection from malware.
    • Avoid opening email attachments from unknown sources as this increases risk of infection.
    • Connecting to a wireless network without permission is illegal and unethical.

    Security Measures for Hardware Protection

    • Implement physical security measures to deter theft and vandalism of computer hardware.
    • Ensure software is legally obtained to avoid issues with piracy and legal repercussions.
    • Awareness of health concerns related to computer usage, such as Repetitive Strain Injury (RSI) and Computer Vision Syndrome (CVS), is important for user wellbeing.

    Techniques for Reducing Eyestrain and Exercises for Hands

    • Incorporate hand exercises such as stretching and strengthening routines to prevent strain.
    • Follow techniques like the 20-20-20 rule to ease eyestrain by looking away from the screen every 20 minutes at an object 20 feet away for 20 seconds.

    Spam and Phishing Awareness

    • Identify unsolicited email messages and be cautious of their legitimacy.
    • Recognize phishing scams that attempt to gather personal and financial information through deceptive emails.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Taking Care of Your Computer: Learn essential tips to keep your computer in top shape, including cleaning techniques, optimal placement, and temperature considerations. Ensure your computer's longevity and performance while staying safe and respectful of others.

    More Like This

    Computer Security and Maintenance
    10 questions
    Computer Hardware and Software Maintenance
    6 questions
    Computer Hardware and Software Maintenance
    6 questions
    Computer Maintenance Chapter 3
    24 questions
    Use Quizgecko on...
    Browser
    Browser