Computer Safety and Ethics Part 1 Quiz
18 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

A firewall acts as a barrier between a trusted internal network and untrusted external networks, such as the ______

internet

Hardware failures, accidental deletions, and malware attacks are additional sources of ______ loss

data

Using a combination of uppercase and lowercase letters in a password helps enhance ______

security

Two-step verification adds an extra layer of security beyond a traditional username and ______ login

<p>password</p> Signup and view all the answers

Avoid using easily guessable information like names, birthdays, or common words when creating a ______

<p>password</p> Signup and view all the answers

Parental control software enables parents to track their children’s computer activity and block access to ______

<p>websites</p> Signup and view all the answers

Filtering is used to block content coming into and going out to the ______

<p>internet</p> Signup and view all the answers

Malware refers to any software that is designed to cause damage to a single computer, server, or computer ______

<p>network</p> Signup and view all the answers

A ______ is a program that has been written to corrupt data on a computer

<p>virus</p> Signup and view all the answers

Keyloggers are malicious software or hardware devices designed to record and capture ______ made on a computer or mobile device

<p>keystrokes</p> Signup and view all the answers

Spyware is a type of malicious software designed to secretly gather information about a user's activities, typically without their ______ or consent

<p>knowledge</p> Signup and view all the answers

Using reputable antivirus and antispyware software, keeping software and operating systems up-to-date are ways of ______ and prevention

<p>detection</p> Signup and view all the answers

Remove sensitive data. Protect yourself from privacy on the computer's Internet and devices. Maintain a healthy computing environment. Explain why it is important to use computers legally and responsibly. What are some of the key benefits and advantages that computer technology brings to our lives, both personally and as a student?

Signup and view all the answers

Identify security risks and protect data. Restrict access to devices and protect against ______.

<p>viruses</p> Signup and view all the answers

Computer security refers to the practice of protecting computer systems, networks, and data from unauthorized access, damage, theft, or ______.

<p>disruption</p> Signup and view all the answers

Security Risk: any action that could harm data, information in computer hardware, software, or processing capability. Name the 3 types of risks: 1. Natural Risks, 2. Accidental Risks, 3. ______ Risks.

<p>Intentional</p> Signup and view all the answers

Examples of Accidental Risks include human errors, hardware failures, and software ______.

<p>glitches</p> Signup and view all the answers

Avoiding Data Loss: Risks of Data Loss include power outages and ______.

Signup and view all the answers

More Like This

Computer Security and Online Safety
6 questions
Computer Ethics and Online Safety Quiz
37 questions
Computer Safety and Ethics Quiz
10 questions
Use Quizgecko on...
Browser
Browser