Computer Safety and Ethics Part 1 Quiz

ColorfulVignette avatar
ColorfulVignette
·
·
Download

Start Quiz

Study Flashcards

18 Questions

A firewall acts as a barrier between a trusted internal network and untrusted external networks, such as the ______

internet

Hardware failures, accidental deletions, and malware attacks are additional sources of ______ loss

data

Using a combination of uppercase and lowercase letters in a password helps enhance ______

security

Two-step verification adds an extra layer of security beyond a traditional username and ______ login

password

Avoid using easily guessable information like names, birthdays, or common words when creating a ______

password

Parental control software enables parents to track their children’s computer activity and block access to ______

websites

Filtering is used to block content coming into and going out to the ______

internet

Malware refers to any software that is designed to cause damage to a single computer, server, or computer ______

network

A ______ is a program that has been written to corrupt data on a computer

virus

Keyloggers are malicious software or hardware devices designed to record and capture ______ made on a computer or mobile device

keystrokes

Spyware is a type of malicious software designed to secretly gather information about a user's activities, typically without their ______ or consent

knowledge

Using reputable antivirus and antispyware software, keeping software and operating systems up-to-date are ways of ______ and prevention

detection

Remove sensitive data. Protect yourself from privacy on the computer's Internet and devices. Maintain a healthy computing environment. Explain why it is important to use computers legally and responsibly. What are some of the key benefits and advantages that computer technology brings to our lives, both personally and as a student?

Identify security risks and protect data. Restrict access to devices and protect against ______.

viruses

Computer security refers to the practice of protecting computer systems, networks, and data from unauthorized access, damage, theft, or ______.

disruption

Security Risk: any action that could harm data, information in computer hardware, software, or processing capability. Name the 3 types of risks: 1. Natural Risks, 2. Accidental Risks, 3. ______ Risks.

Intentional

Examples of Accidental Risks include human errors, hardware failures, and software ______.

glitches

Avoiding Data Loss: Risks of Data Loss include power outages and ______.

Test your knowledge on identifying security risks, protecting data, restricting access to devices, safeguarding against viruses, recognizing false information, ensuring ecommerce safety, removing sensitive data, and maintaining a healthy computing environment.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser