True/False
1. T
2. T
3. F
4. T
5. F
6. T
7. T
8. T
9. F
10. F
11. T
12. F
1. T
2. T
3. F
4. T
5. F
6. T
7. T
8. T
9. F
10. F
11. T
12. F
Multiple Choice
1. B
2. D
3. A
4. C
5. C
6. D
7. D
8. C
1. B
2. D
3. A
4. C
5. C
6. D
7. D
8. C
Matching
1. J
2. D
3. E
4. G
5. I
6. C
7. B
8. A
9. H
10. F
1. J
2. D
3. E
4. G
5. I
6. C
7. B
8. A
9. H
10. F
Short Answer
1. How antivirus programs detect and identify a virus:
- By looking for virus signatures. A virus signature, also called a virus definition, is a known specific pattern of
virus code.
- By inoculate existing program files. To inoculate a program file, the antivirus program records information such as
the file size
and file creation date in a separate inoculation file. The antivirus program then uses this information to detect if a virus
tam pers with the data describing the inoculated program file.
A virus hoax is an e-mail message that warns users of a nonexistent virus or other malware.
1. How antivirus programs detect and identify a virus:
- By looking for virus signatures. A virus signature, also called a virus definition, is a known specific pattern of
virus code.
- By inoculate existing program files. To inoculate a program file, the antivirus program records information such as
the file size
and file creation date in a separate inoculation file. The antivirus program then uses this information to detect if a virus
tam pers with the data describing the inoculated program file.
A virus hoax is an e-mail message that warns users of a nonexistent virus or other malware.
2. ENERGY STAR program: The United States Department of Energy (DOE) and the United States Environmental Protection Agency
(EPA)developed the ENERGY STAR program to help reduce the amount of electricity used by computers and related devices. This
program encourages manufacturers to create energy- efficient devices that require little power when they are not in use. For
example, many devices switch to sleep or power save mode after a specified number of inactive minutes or hours.
Users should handle obsolete computers by Recycling and refurbishing old equipment that are much safer alternatives for
the environment.
(EPA)developed the ENERGY STAR program to help reduce the amount of electricity used by computers and related devices. This
program encourages manufacturers to create energy- efficient devices that require little power when they are not in use. For
example, many devices switch to sleep or power save mode after a specified number of inactive minutes or hours.
Users should handle obsolete computers by Recycling and refurbishing old equipment that are much safer alternatives for
the environment.
3. Information privacy refers to the right of individuals and companies to deny or restrict the collection and use of
information about them.
Five ways to safeguard your personal information:
- Fill in only necessary information on rebate, warranty, and registration forms.
- Do not preprint your telephone number or Social Security number on personal checks.
- Have an unlisted or unpublished telephone number.
- If Caller ID is available in your area, find out how to block your number from displaying on the receiver’s system.
- Do not write your telephone number on charge or credit receipts.
information about them.
Five ways to safeguard your personal information:
- Fill in only necessary information on rebate, warranty, and registration forms.
- Do not preprint your telephone number or Social Security number on personal checks.
- Have an unlisted or unpublished telephone number.
- If Caller ID is available in your area, find out how to block your number from displaying on the receiver’s system.
- Do not write your telephone number on charge or credit receipts.
4. Two methods for avoiding phishing attacks are:
- If you receive an e-mail message that looks legitimate and requests you update credit card numbers, Social Security
numbers, bank account numbers, passwords, or other private information, the FTC recommends you visit the Web site directly to
determine if the request is valid.
- Never click a link in an e-mail message; instead, retype the Web address in your browser.
How clickjacking works: With clickjacking, an object that can be clicked on a Web site, such as a button, image, or
link, contains a malicious program. When a user clicks the disguised object, a variety of nefarious events may occur. For
example, the user may be redirected to a phony Web site that requests personal information, or a virus may download to the
computer.
- If you receive an e-mail message that looks legitimate and requests you update credit card numbers, Social Security
numbers, bank account numbers, passwords, or other private information, the FTC recommends you visit the Web site directly to
determine if the request is valid.
- Never click a link in an e-mail message; instead, retype the Web address in your browser.
How clickjacking works: With clickjacking, an object that can be clicked on a Web site, such as a button, image, or
link, contains a malicious program. When a user clicks the disguised object, a variety of nefarious events may occur. For
example, the user may be redirected to a phony Web site that requests personal information, or a virus may download to the
computer.
5. Many businesses use content filtering to limit employees’ Web access. These businesses argue that employees are
unproductive when visiting inappropriate or objectionable Web sites. Some schools, libraries, and parents use content
filtering to restrict access to minors.
Rating system used for content filtering: a rating system of the Internet Content Rating Association (ICRA), which is
similar to those used for movies and videos. Major Web sites such as Yahoo!, AOL, and MSN use the rating system established
by the ICRA. If content at the Web site goes beyond the rating limits set in the Web browser software, a user cannot access
the Web site. Concerned parents can set the rating limits and prevent these limits from being changed by using a password.
unproductive when visiting inappropriate or objectionable Web sites. Some schools, libraries, and parents use content
filtering to restrict access to minors.
Rating system used for content filtering: a rating system of the Internet Content Rating Association (ICRA), which is
similar to those used for movies and videos. Major Web sites such as Yahoo!, AOL, and MSN use the rating system established
by the ICRA. If content at the Web site goes beyond the rating limits set in the Web browser software, a user cannot access
the Web site. Concerned parents can set the rating limits and prevent these limits from being changed by using a password.
No comments:
Post a Comment