Podcast
Questions and Answers
What is Module 6?
What is Module 6?
How can you protect a computer from electrical spikes and surges?
How can you protect a computer from electrical spikes and surges?
Use a surge protector.
How will you decide which browser security settings to allow and which ones to block?
How will you decide which browser security settings to allow and which ones to block?
I will need to review each browser security setting and use my best judgement.
What is a digital certificate?
What is a digital certificate?
Signup and view all the answers
_____ ensures that the person requesting access to a computer is not an imposter.
_____ ensures that the person requesting access to a computer is not an imposter.
Signup and view all the answers
Based on Cassidy's actions, what systems do you think the hospital has in place to protect the patient medical records?
Based on Cassidy's actions, what systems do you think the hospital has in place to protect the patient medical records?
Signup and view all the answers
In which of the following situations is a digital certificate useful?
In which of the following situations is a digital certificate useful?
Signup and view all the answers
You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.
You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.
Signup and view all the answers
Which of the following statements about browser security settings is false?
Which of the following statements about browser security settings is false?
Signup and view all the answers
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?
Signup and view all the answers
What is a first step to deter thieves from accessing your financial information?
What is a first step to deter thieves from accessing your financial information?
Signup and view all the answers
Which of the following types of websites typically provides the least security?
Which of the following types of websites typically provides the least security?
Signup and view all the answers
With more and more people using technology, what physical health diagnosis is on the rise?
With more and more people using technology, what physical health diagnosis is on the rise?
Signup and view all the answers
Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.
Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.
Signup and view all the answers
You can monitor and protect your financial data in all of the following ways EXCEPT _____.
You can monitor and protect your financial data in all of the following ways EXCEPT _____.
Signup and view all the answers
How can an attacker execute malware through a script?
How can an attacker execute malware through a script?
Signup and view all the answers
What would a password manager allow you to do?
What would a password manager allow you to do?
Signup and view all the answers
Why is it not safe to connect to public Wi-Fi networks?
Why is it not safe to connect to public Wi-Fi networks?
Signup and view all the answers
How is a worm different from a Trojan?
How is a worm different from a Trojan?
Signup and view all the answers
Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?
Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?
Signup and view all the answers
How does discarding computers in a landfill affect the environment?
How does discarding computers in a landfill affect the environment?
Signup and view all the answers
How does encryption work?
How does encryption work?
Signup and view all the answers
In terms of privacy, which of the following is a best practice?
In terms of privacy, which of the following is a best practice?
Signup and view all the answers
What type of malware might Emma have downloaded to her computer?
What type of malware might Emma have downloaded to her computer?
Signup and view all the answers
Which of the following is the strongest password?
Which of the following is the strongest password?
Signup and view all the answers
Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?
Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?
Signup and view all the answers
Study Notes
Computer Protection and Security
- Surge protectors guard against electrical spikes and surges by absorbing changes before they reach computer equipment.
- Decisions on browser security settings should rely on individual judgement and careful evaluation of each setting's impact on computer access.
- Authentication verifies user identity; methods include strong passwords, biometrics, and two-factor authentication.
Digital Certificates and Website Security
- Digital certificates verify user identity through a key signed by a trusted authority, often utilized in legal agreements, like rental leases.
- Configuring a wireless router involves setting security measures, while naming it can't effectively protect devices.
- Browser security settings allow managing web history, cookies, and scripts to enhance online safety.
Ergonomics and Health Considerations
- Ergonomics focuses on design and arrangement for efficient human-computer interaction, promoting user comfort and safety.
- Rising diagnoses linked to technology use include repetitive strain injury, affecting muscles and tendons due to prolonged device usage.
Data Management and Cybersecurity
- Data backups are vital for recovering information from hardware failures, user errors, or disasters, providing a safety net for important files.
- Personal information should not be shared over the phone or email to deter identity theft.
Malware and Online Threats
- Worms propagate through networks, while Trojans disguise themselves as legitimate software but perform malicious actions once installed.
- Public Wi-Fi networks pose significant risks due to lack of protection and potential threats like evil twin setups.
Environmental Impact of Technology
- Disposing of computers in landfills contributes to environmental hazards as toxic substances like lead and mercury leach into soil and water supplies.
Encryption and Privacy
- Encryption protects information by scrambling it, making it inaccessible without the corresponding key to decrypt it.
- Best privacy practices include securing sensitive information, like Social Security numbers, in a locked box to prevent unauthorized access.
Identity Theft Techniques
- Pretexting is a method of identity theft where individuals pose as legitimate figures to solicit personal information from victims.
Strong Password Practices
- Crafting strong passwords involves using longer combinations of letters, numbers, and symbols to enhance security, exemplified by “H@veAGr3atDaY!”.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge with these flashcards for ITE 115 Exam 2. This set covers important topics from Module 6, including computer protection methods and browsing decisions. Perfect for reviewing key concepts and preparing for your exam.