Podcast
Questions and Answers
A firewall acts as a barrier between a trusted internal network and untrusted external networks, such as the ______
A firewall acts as a barrier between a trusted internal network and untrusted external networks, such as the ______
internet
Hardware failures, accidental deletions, and malware attacks are additional sources of ______ loss
Hardware failures, accidental deletions, and malware attacks are additional sources of ______ loss
data
Using a combination of uppercase and lowercase letters in a password helps enhance ______
Using a combination of uppercase and lowercase letters in a password helps enhance ______
security
Two-step verification adds an extra layer of security beyond a traditional username and ______ login
Two-step verification adds an extra layer of security beyond a traditional username and ______ login
Avoid using easily guessable information like names, birthdays, or common words when creating a ______
Avoid using easily guessable information like names, birthdays, or common words when creating a ______
Parental control software enables parents to track their children’s computer activity and block access to ______
Parental control software enables parents to track their children’s computer activity and block access to ______
Filtering is used to block content coming into and going out to the ______
Filtering is used to block content coming into and going out to the ______
Malware refers to any software that is designed to cause damage to a single computer, server, or computer ______
Malware refers to any software that is designed to cause damage to a single computer, server, or computer ______
A ______ is a program that has been written to corrupt data on a computer
A ______ is a program that has been written to corrupt data on a computer
Keyloggers are malicious software or hardware devices designed to record and capture ______ made on a computer or mobile device
Keyloggers are malicious software or hardware devices designed to record and capture ______ made on a computer or mobile device
Spyware is a type of malicious software designed to secretly gather information about a user's activities, typically without their ______ or consent
Spyware is a type of malicious software designed to secretly gather information about a user's activities, typically without their ______ or consent
Using reputable antivirus and antispyware software, keeping software and operating systems up-to-date are ways of ______ and prevention
Using reputable antivirus and antispyware software, keeping software and operating systems up-to-date are ways of ______ and prevention
Remove sensitive data. Protect yourself from privacy on the computer's Internet and devices. Maintain a healthy computing environment. Explain why it is important to use computers legally and responsibly. What are some of the key benefits and advantages that computer technology brings to our lives, both personally and as a student?
Remove sensitive data. Protect yourself from privacy on the computer's Internet and devices. Maintain a healthy computing environment. Explain why it is important to use computers legally and responsibly. What are some of the key benefits and advantages that computer technology brings to our lives, both personally and as a student?
Identify security risks and protect data. Restrict access to devices and protect against ______.
Identify security risks and protect data. Restrict access to devices and protect against ______.
Computer security refers to the practice of protecting computer systems, networks, and data from unauthorized access, damage, theft, or ______.
Computer security refers to the practice of protecting computer systems, networks, and data from unauthorized access, damage, theft, or ______.
Security Risk: any action that could harm data, information in computer hardware, software, or processing capability. Name the 3 types of risks: 1. Natural Risks, 2. Accidental Risks, 3. ______ Risks.
Security Risk: any action that could harm data, information in computer hardware, software, or processing capability. Name the 3 types of risks: 1. Natural Risks, 2. Accidental Risks, 3. ______ Risks.
Examples of Accidental Risks include human errors, hardware failures, and software ______.
Examples of Accidental Risks include human errors, hardware failures, and software ______.
Avoiding Data Loss: Risks of Data Loss include power outages and ______.
Avoiding Data Loss: Risks of Data Loss include power outages and ______.