Wednesday, August 10, 2011

cont. quiz 9 answer

4. Identify safeguards against hardware theft and vandalism


hardware theft = stealing computer equipment
hardware vandalism = defacing or destroying computer equipment

Safeguards Against Hardware Theft And Vandalism 
*      Restricted access (locked doors and windows)
*      Alarm systems
*      Cables
                        *      Locking devices for hard disk, other drives

5. Explain the ways software manufacturers protect against software piracy.
 
Safeguards Against Software Theft

1.  license agreement                               
 single-user license agreement end-user license agreement (EULA).
Install on one computer
Make one copy as backup
Give or sell only after removing from first source

2.  product activation  = links particular computer to particular software

6. Discuss how encryption works, and explain why it is necessary

7. Discuss the types of devices available that protect computers from
system failure

8. Explain the options available for backing up computer resources.

9. Identify risks and safeguards associated with wireless communications.

10. Discuss ways to prevent health-related disorders and injuries due to computer use.


11. Recognize issues related to information accuracy, intellectual property rights, codes of conduct, and green computing.

Decisions and actions are based on the accuracy of information.Just because something is on the web does not mean that it is accurate.Concerns about the ethics of using computers to alter output.
  
 Intellectual property rights
*      Ideas
*      Inventions writings
*      Art
*      Processes
*      Company and product names
*      Logos

Codes of Conduct  = guidelines for acceptable information technology behavior

12. Discuss issues surrounding information privacy, including electronic
profiles, cookies, spyware and adware, spam, phishing, privacy laws, social engineering, employee monitoring, and content filtering
.

Electronic profiles - Read the privacy statements that come to you and keep a copy of what you choose 
Cookies = small text file that contains information about you or your preferences
Spyware = program placed on user’s computer without the user’s knowledge that secretly collects information about the user. 
Spam = unsolicited email message or newsgroup posting
Privacy laws                  
          Federal laws dealing specifically with computers:
*      Electronic Communications Privacy Act (ECPA)
*      Computer Matching and Privacy Protection Act
*      Computer Fraud and Abuse Acts
*      Fair Credit Reporting Act.
Content filtering = There is no censorship on the Internet.

cont. quiz 9 answer

4. Identify safeguards against hardware theft and vandalism


hardware theft = stealing computer equipment
hardware vandalism = defacing or destroying computer equipment

Safeguards Against Hardware Theft And Vandalism 
*      Restricted access (locked doors and windows)
*      Alarm systems
*      Cables
                        *      Locking devices for hard disk, other drives

5. Explain the ways software manufacturers protect against software piracy.
 
Safeguards Against Software Theft

1.  license agreement                               
 single-user license agreement end-user license agreement (EULA).
Install on one computer
Make one copy as backup
Give or sell only after removing from first source

2.  product activation  = links particular computer to particular software

6. Discuss how encryption works, and explain why it is necessary

7. Discuss the types of devices available that protect computers from
system failure

8. Explain the options available for backing up computer resources.

9. Identify risks and safeguards associated with wireless communications.

10. Discuss ways to prevent health-related disorders and injuries due to computer use.


11. Recognize issues related to information accuracy, intellectual property rights, codes of conduct, and green computing.

Decisions and actions are based on the accuracy of information.Just because something is on the web does not mean that it is accurate.Concerns about the ethics of using computers to alter output.
  
 Intellectual property rights
*      Ideas
*      Inventions writings
*      Art
*      Processes
*      Company and product names
*      Logos

Codes of Conduct  = guidelines for acceptable information technology behavior

12. Discuss issues surrounding information privacy, including electronic
profiles, cookies, spyware and adware, spam, phishing, privacy laws, social engineering, employee monitoring, and content filtering
.

Electronic profiles - Read the privacy statements that come to you and keep a copy of what you choose 
Cookies = small text file that contains information about you or your preferences
Spyware = program placed on user’s computer without the user’s knowledge that secretly collects information about the user. 
Spam = unsolicited email message or newsgroup posting
Privacy laws                  
          Federal laws dealing specifically with computers:
*      Electronic Communications Privacy Act (ECPA)
*      Computer Matching and Privacy Protection Act
*      Computer Fraud and Abuse Acts
*      Fair Credit Reporting Act.
Content filtering = There is no censorship on the Internet.

quiz 9 - answer

1.       Define the term, computer security risks, and briefly describe the types of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy, unethical employee, cyberextortionist, and cyberterrorist.

computer security risk.  = an event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability

hacker = originally a complimentary word for a computer enthusiast.  Now it has a derogatory connotation with the same definition as cracker

cracker = person who tries to access a computer or network illegally


2. Describe various types of Internet and network attacks (computer viruses, worms, Trojan horses, rootkits, botnets, denial of service attacks, back doors, and spoofing), and identify ways to safeguard against these attacks, including firewalls, intrusion detection software, and honeypots.

Virus = alters the way the computer works, without the user’s knowledge

Worm = copies itself repeatedly, using up memory space or slowing down a network
           
Trojan horse = malicious program within a legitimate program

Safeguards against computer viruses, worms, and Trojan horses

No methods guarantee a computer or network is safe from malicious-logic programs.
Precautions that can be taken to reduce the risk of virus infection:

1.  do not boot the computer with a disk in the A: drive
2.  only open email from a trusted source
trusted source = company or person you believe will not send you a virus-infected file knowingly.
3.  turn off the message preview function for email programs
4.  set the macro security level to medium            
5. install an anti virus program and update it frequently
6.  If the anti-virus program flags an email attachment as infected, delete the email immediately
7.  scan all portable disks for viruses (floppies, zip disks, etc)
8.  Create a recovery disk and write protect it
9. Install a firewall
10.  Make backup copies of your important files



3. Discuss techniques to prevent unauthorized computer access and use

Safeguards against unauthorized access and use

1.  Companies should have an acceptable use policy (AUP).

2.      Firewalls

Monday, August 8, 2011

Quiz 8 - answer


1. Define the term, database, and explain how a database interacts with data and information.

A database is an organized collection of data for one or more purposes, usually in digital form.
 The term "database" refers both to the way its users view it, and to the logical and physical materialization of its data, content, in files, computer memory, and computer data storage

2. Describe file maintenance techniques (adding records, modifying records, deleting records) and validation techniques.

3. Discuss the terms character, field, record, and file

Character is a unit of information that roughly corresponds to a grapheme, grapheme-like unit, or symbol, such as in an alphabet or syllabary in the written form of a natural language.

The elements of records are usually called fields or members.

A record is a value that contains other values, typically in fixed number and sequence and typically indexed by names.

A computer file is a block of arbitrary information, or resource for storing information, which is available to a computer program and is usually based on some kind of durable storage.

4. Discuss the functions common to most database management systems: data dictionary, file retrieval and maintenance, data security, and backup and recovery.
The Database Library is built on a Data Dictionary, which provides a complete description of record layouts and indexes of the database, for validation and efficient data access.
The file organizer functions allow you to create folders based on information contained inside the file and outside the file system it is stored in, and move / copy the file to these folders.

5. Differentiate between a file processing approach and the database approach.
File processing approach - each department or area within an organization has its own set of data files.
Database Approach -Many programs and users share the data in a database. Reduces data redundancy, improves data integrity, shares data, permits easier access, and reduces development time.

6. Describe characteristics of relational, object-oriented, and multidimensional databases.

Relational Database - is a database that stores data in tables that consist of rows and columns. Each row has a primary key and each column has a unique name.
Object - oriented database (OODB) - stores data in objects. An object is an item that contains data, as well as the actions that read or process the data.
Multidimensional database - stores data in dimensions and can store more than two dimensions of data.

7. Explain how to access Web databases.

You can use Access 2010 and Access Services, a new component of SharePoint, to build web database applications. This helps you:
  • Secure and manage access to your data
  • Share data throughout an organization, or over the Internet
 Note    A user account is required to use a web database. Anonymous access is not supported.
  • Create database applications that don't require Access to use
8. Define the term, computer security risks, and briefly describe the types of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy, unethical employee, cyberextortionist, and cyberterrorist.

9. Identify database design guidelines and discuss the responsibilities of database analysts and administrators.

10. Discuss techniques to prevent unauthorized computer access and use