CT006-3-1 Computing and IT at the Workplace Digital Security
DGTIN – Digital Thinking and Innovation
Tutorial 11 – Digital Security
SECTION A
Review Questions
1. A _digital security risk___ is any event or action that could cause a loss of or damage to computer hardware,
software, data, information or processing capability.
2. Computer viruses, worms, and Trojan horses are classified as ___malware_________ which are programs that act
without a user’s knowledge and deliberately alter the computer’s operations.
Figure 11-3
3.As shown in Figure 11-3, a(n) _antivirus program_____ protects a computer against viruses by identifying and
removing any computer viruses found in memory, on storage media or on incoming files.
4.A more devastating type of DoS attack is the _DDOS_______ in which multiple unsuspecting computers are used to
attack multiple computer networks.
5.__Backup procedure_____ is a regular plan of copying and storing data and program files
6.A(n) _personal firewall__ is a utility program that detects and protects a personal computer and its data from
unauthorized access.
An __detection software________ automatically analyzes all network traffic, assesses system vulnerabilities, identifies
any unauthorized access (intrusions), and notifies a network administrator of suspicious behavior patterns or system
breaches.
Level 1 Asia Pacific University of Technology and Innovation Page 1
CT006-3-1 Computing and IT at the Workplace Digital Security
Figure 11-2
8. Many Web sites, like that in Figure 11-2, require a user to enter a(n) _username______ which is a unique
combination of characters such as alphabets or numbers.
9. Many Web sites, like in Figure 11-2, require a user to enter a(n) _password______ which is a private combination of
characters associated with a user name that allows access to certain computer resources.
10. _Software theft________ occurs when someone steals software media, intentionally erases software or illegally copies
a software program.
11. Software _piracy_______ is the unauthorized and illegal duplication of copyrighted software.
12. _Identity theft_______ occurs when someone steals personal or confidential
information.
13. To read encrypted data the recipient must _decrypt_/decode____ or decipher it into a readable form.
14. A _system failure_______ is the prolonged malfunction of a computer.
15. _Noise_____ is any unwanted signal, usually varying quickly, that is mixed
with the normal voltage entering a computer.
16. A(n) _undervoltage_____ is a drop in electrical supply
17. To _duplicate_/backup____ a file means to make a copy of it.
18. In the case of system failure or the discovery of corrupted files, users _restore______ the files by copying the
backed-up files to their original location on a computer.
19. _Computer ethics______are the moral guidelines that govern the use of computers and information systems.
20. Copyright ________ are the rights to which creators are entitled for their work.
21. An IT _code of ethics______is a written guideline that helps determine whether a
specific computer action is ethical or unethical.
__Information piracy___refers to the right of individuals and companies to deny or restrict the collection and use
of information about them.
Level 1 Asia Pacific University of Technology and Innovation Page 2
CT006-3-1 Computing and IT at the Workplace Digital Security
22. _Spyware_____ is a program placed on a computer without the user’s knowledge that secretly collects information
about the user.
23. ___Computer addiction_____ occurs when a computer consumes someone’s entire social life.
25. Users may have _sympthon______ if they have sore, tired, burning, itching or dry eyes; blurred or double vision; or
difficulty focusing on a screen image.
Level 1 Asia Pacific University of Technology and Innovation Page 3