Podcast
Questions and Answers
A firewall acts as a barrier between a trusted internal network and untrusted external networks, such as the ______
A firewall acts as a barrier between a trusted internal network and untrusted external networks, such as the ______
internet
Hardware failures, accidental deletions, and malware attacks are additional sources of ______ loss
Hardware failures, accidental deletions, and malware attacks are additional sources of ______ loss
data
Using a combination of uppercase and lowercase letters in a password helps enhance ______
Using a combination of uppercase and lowercase letters in a password helps enhance ______
security
Two-step verification adds an extra layer of security beyond a traditional username and ______ login
Two-step verification adds an extra layer of security beyond a traditional username and ______ login
Signup and view all the answers
Avoid using easily guessable information like names, birthdays, or common words when creating a ______
Avoid using easily guessable information like names, birthdays, or common words when creating a ______
Signup and view all the answers
Parental control software enables parents to track their children’s computer activity and block access to ______
Parental control software enables parents to track their children’s computer activity and block access to ______
Signup and view all the answers
Filtering is used to block content coming into and going out to the ______
Filtering is used to block content coming into and going out to the ______
Signup and view all the answers
Malware refers to any software that is designed to cause damage to a single computer, server, or computer ______
Malware refers to any software that is designed to cause damage to a single computer, server, or computer ______
Signup and view all the answers
A ______ is a program that has been written to corrupt data on a computer
A ______ is a program that has been written to corrupt data on a computer
Signup and view all the answers
Keyloggers are malicious software or hardware devices designed to record and capture ______ made on a computer or mobile device
Keyloggers are malicious software or hardware devices designed to record and capture ______ made on a computer or mobile device
Signup and view all the answers
Spyware is a type of malicious software designed to secretly gather information about a user's activities, typically without their ______ or consent
Spyware is a type of malicious software designed to secretly gather information about a user's activities, typically without their ______ or consent
Signup and view all the answers
Using reputable antivirus and antispyware software, keeping software and operating systems up-to-date are ways of ______ and prevention
Using reputable antivirus and antispyware software, keeping software and operating systems up-to-date are ways of ______ and prevention
Signup and view all the answers
Remove sensitive data. Protect yourself from privacy on the computer's Internet and devices. Maintain a healthy computing environment. Explain why it is important to use computers legally and responsibly. What are some of the key benefits and advantages that computer technology brings to our lives, both personally and as a student?
Remove sensitive data. Protect yourself from privacy on the computer's Internet and devices. Maintain a healthy computing environment. Explain why it is important to use computers legally and responsibly. What are some of the key benefits and advantages that computer technology brings to our lives, both personally and as a student?
Signup and view all the answers
Identify security risks and protect data. Restrict access to devices and protect against ______.
Identify security risks and protect data. Restrict access to devices and protect against ______.
Signup and view all the answers
Computer security refers to the practice of protecting computer systems, networks, and data from unauthorized access, damage, theft, or ______.
Computer security refers to the practice of protecting computer systems, networks, and data from unauthorized access, damage, theft, or ______.
Signup and view all the answers
Security Risk: any action that could harm data, information in computer hardware, software, or processing capability. Name the 3 types of risks: 1. Natural Risks, 2. Accidental Risks, 3. ______ Risks.
Security Risk: any action that could harm data, information in computer hardware, software, or processing capability. Name the 3 types of risks: 1. Natural Risks, 2. Accidental Risks, 3. ______ Risks.
Signup and view all the answers
Examples of Accidental Risks include human errors, hardware failures, and software ______.
Examples of Accidental Risks include human errors, hardware failures, and software ______.
Signup and view all the answers
Avoiding Data Loss: Risks of Data Loss include power outages and ______.
Avoiding Data Loss: Risks of Data Loss include power outages and ______.
Signup and view all the answers