Wednesday, August 10, 2011

cont. quiz 9 answer

4. Identify safeguards against hardware theft and vandalism


hardware theft = stealing computer equipment
hardware vandalism = defacing or destroying computer equipment

Safeguards Against Hardware Theft And Vandalism 
*      Restricted access (locked doors and windows)
*      Alarm systems
*      Cables
                        *      Locking devices for hard disk, other drives

5. Explain the ways software manufacturers protect against software piracy.
 
Safeguards Against Software Theft

1.  license agreement                               
 single-user license agreement end-user license agreement (EULA).
Install on one computer
Make one copy as backup
Give or sell only after removing from first source

2.  product activation  = links particular computer to particular software

6. Discuss how encryption works, and explain why it is necessary

7. Discuss the types of devices available that protect computers from
system failure

8. Explain the options available for backing up computer resources.

9. Identify risks and safeguards associated with wireless communications.

10. Discuss ways to prevent health-related disorders and injuries due to computer use.


11. Recognize issues related to information accuracy, intellectual property rights, codes of conduct, and green computing.

Decisions and actions are based on the accuracy of information.Just because something is on the web does not mean that it is accurate.Concerns about the ethics of using computers to alter output.
  
 Intellectual property rights
*      Ideas
*      Inventions writings
*      Art
*      Processes
*      Company and product names
*      Logos

Codes of Conduct  = guidelines for acceptable information technology behavior

12. Discuss issues surrounding information privacy, including electronic
profiles, cookies, spyware and adware, spam, phishing, privacy laws, social engineering, employee monitoring, and content filtering
.

Electronic profiles - Read the privacy statements that come to you and keep a copy of what you choose 
Cookies = small text file that contains information about you or your preferences
Spyware = program placed on user’s computer without the user’s knowledge that secretly collects information about the user. 
Spam = unsolicited email message or newsgroup posting
Privacy laws                  
          Federal laws dealing specifically with computers:
*      Electronic Communications Privacy Act (ECPA)
*      Computer Matching and Privacy Protection Act
*      Computer Fraud and Abuse Acts
*      Fair Credit Reporting Act.
Content filtering = There is no censorship on the Internet.

No comments:

Post a Comment