Understanding Computers Chapter 15: Protecting Against Hardware Loss Quiz

FlatteringMaroon avatar
FlatteringMaroon
·
·
Download

Start Quiz

Study Flashcards

18 Questions

What is the difference between Full Disk Encryption (FDE) and a self-encrypting hard drive?

FDE encrypts everything on the storage medium, while a self-encrypting hard drive is a hard drive itself using FDE.

How does computer tracking software help in finding a lost or stolen PC?

Computer tracking software sends out identifying data via the Internet, which can be used by law enforcement to recover the PC.

What is the purpose of a kill switch in the context of protecting against hardware loss?

A kill switch is software used to destroy sensitive data on a stolen or lost PC.

How do ruggedized PCs differ from conventional hardware in terms of hardware care?

Ruggedized PCs are designed for more abuse than conventional hardware, requiring less delicate handling.

What is the role of a surge suppressor in protecting hardware from damage?

A surge suppressor protects hardware from damage due to electrical fluctuations.

How does an Uninterruptible Power Supply (UPS) contribute to hardware protection?

A UPS provides continuous power to a computer system for a period after the power goes off, preventing data loss and hardware damage.

What is a digital watermark?

A subtle alteration to a digital item that can be retrieved to identify the owner of the item.

What are some technologies used for protecting U.S. currency?

Special paper with digital watermarks, holograms, RFID tags, and hard-to-reproduce content.

Why should businesses be concerned about information privacy?

Businesses need to be concerned about the expense, damage to reputation, and possible lawsuits.

What is a marketing database?

A collection of data about people used for marketing purposes, obtained through online and offline purchases, public information, etc.

How can businesses protect against software piracy?

By implementing protection measures such as digital watermarks, holograms, RFID tags, and hard-to-reproduce content.

What are some privacy challenges related to web activity and e-mail?

Concerns include privacy breaches, unauthorized intrusion, and lack of control over collected information.

What is continuous data protection (CDP)?

Enables data backups to be made on a continual basis

Explain what a disaster-recovery plan is.

Spells out what an organization will do to prepare for and recover from a disruptive event

How can businesses and individuals protect against software piracy?

Educating businesses and consumers, strengthening antipiracy laws, using holograms, mandatory product registration/activation, and monitoring online auction sites/lawsuits

What is digital counterfeiting and how can it be prevented?

Digital counterfeiting is the illegal copying of currency, checks, collectibles, etc. Prevention methods include new currency designs with features like microprinting, watermarks, and security threads.

Why is it important for businesses and individuals to have backup and disaster recovery plans?

To minimize data loss and downtime in case of hardware failure, disasters, or other disruptive events

What is one way to secure backup media?

Storing backup media at secure remote locations

Test your knowledge on protecting against hardware loss, damage, and system failure with this quiz based on Chapter 15 of 'Understanding Computers, 12th Edition'. Topics include full disk encryption, self-encrypting hard drives, computer tracking software, and kill switch technology.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser