0% found this document useful (0 votes)
40 views3 pages

Tutorial 11 Digital Security - Question

Uploaded by

Wong Jia Yuan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views3 pages

Tutorial 11 Digital Security - Question

Uploaded by

Wong Jia Yuan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

CT006-3-1 Computing and IT at the Workplace Digital Security

DGTIN – Digital Thinking and Innovation

Tutorial 11 – Digital Security

SECTION A

Review Questions
1. A _digital security risk___ is any event or action that could cause a loss of or damage to computer hardware,
software, data, information or processing capability.

2. Computer viruses, worms, and Trojan horses are classified as ___malware_________ which are programs that act
without a user’s knowledge and deliberately alter the computer’s operations.

Figure 11-3

3.As shown in Figure 11-3, a(n) _antivirus program_____ protects a computer against viruses by identifying and
removing any computer viruses found in memory, on storage media or on incoming files.

4.A more devastating type of DoS attack is the _DDOS_______ in which multiple unsuspecting computers are used to
attack multiple computer networks.

5.__Backup procedure_____ is a regular plan of copying and storing data and program files

6.A(n) _personal firewall__ is a utility program that detects and protects a personal computer and its data from
unauthorized access.

An __detection software________ automatically analyzes all network traffic, assesses system vulnerabilities, identifies
any unauthorized access (intrusions), and notifies a network administrator of suspicious behavior patterns or system
breaches.

Level 1 Asia Pacific University of Technology and Innovation Page 1


CT006-3-1 Computing and IT at the Workplace Digital Security

Figure 11-2
8. Many Web sites, like that in Figure 11-2, require a user to enter a(n) _username______ which is a unique
combination of characters such as alphabets or numbers.

9. Many Web sites, like in Figure 11-2, require a user to enter a(n) _password______ which is a private combination of
characters associated with a user name that allows access to certain computer resources.

10. _Software theft________ occurs when someone steals software media, intentionally erases software or illegally copies
a software program.

11. Software _piracy_______ is the unauthorized and illegal duplication of copyrighted software.

12. _Identity theft_______ occurs when someone steals personal or confidential


information.

13. To read encrypted data the recipient must _decrypt_/decode____ or decipher it into a readable form.

14. A _system failure_______ is the prolonged malfunction of a computer.

15. _Noise_____ is any unwanted signal, usually varying quickly, that is mixed
with the normal voltage entering a computer.

16. A(n) _undervoltage_____ is a drop in electrical supply

17. To _duplicate_/backup____ a file means to make a copy of it.

18. In the case of system failure or the discovery of corrupted files, users _restore______ the files by copying the
backed-up files to their original location on a computer.

19. _Computer ethics______are the moral guidelines that govern the use of computers and information systems.

20. Copyright ________ are the rights to which creators are entitled for their work.

21. An IT _code of ethics______is a written guideline that helps determine whether a


specific computer action is ethical or unethical.

__Information piracy___refers to the right of individuals and companies to deny or restrict the collection and use
of information about them.

Level 1 Asia Pacific University of Technology and Innovation Page 2


CT006-3-1 Computing and IT at the Workplace Digital Security

22. _Spyware_____ is a program placed on a computer without the user’s knowledge that secretly collects information
about the user.

23. ___Computer addiction_____ occurs when a computer consumes someone’s entire social life.

25. Users may have _sympthon______ if they have sore, tired, burning, itching or dry eyes; blurred or double vision; or
difficulty focusing on a screen image.

Level 1 Asia Pacific University of Technology and Innovation Page 3

You might also like