CT006-3-1 Computing and IT at the Workplace Digital Security
DGTIN – Digital Thinking and Innovation
Tutorial 11 – Digital Security
SECTION A
Review Questions
1. A _______ is any event or action that could cause a loss of or damage to computer hardware, software, data,
information or processing capability.
2. Computer viruses, worms, and Trojan horses are classified as _______which are programs that act
without a user’s knowledge and deliberately alter the computer’s operations.
Figure 11-3
3. As shown in Figure 11-3, a(n) ______ protects a computer against viruses by identifying and removing any
computer viruses found in memory, on storage media or on incoming files.
4. A more devastating type of DoS attack is the ______in which multiple unsuspecting computers are used to
attack multiple computer networks.
5. _______ is a regular plan of copying and storing data and program files.
6. A(n) _____ is a utility program that detects and protects a personal computer and its data from unauthorized
access.
7. An _______automatically analyzes all network traffic, assesses system vulnerabilities, identifies any
unauthorized access (intrusions), and notifies a network administrator of suspicious behaviour patterns or system
breaches.
Figure 11-2
8. Many Web sites, like that in Figure 11-2, require a user to enter a(n) _______ which is a unique combination of
characters such as alphabets or numbers.
Level 1 Asia Pacific University of Technology and Innovation Page 1
CT006-3-1 Computing and IT at the Workplace Digital Security
7. 9. Many Web sites, like in Figure 11-2, require a user to enter a(n) _______ which is a private combination of characters
associated with a user-name that allows access to certain computer resources.
8. 10. _________ occurs when someone steals software media, intentionally erases software or illegally copies a software
program.
9. 11. Software ________ is the unauthorized and illegal duplication of copyrighted software.
10. 12. ________ occurs when someone steals personal or confidential information.
11. 13. To read encrypted data the recipient must ______ or decipher it into a readable form.
12. 14. A ________ is the prolonged malfunction of a computer.
14.
13. 15. _______ is any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer.
15. 16. A(n) ______ is a drop in electrical supply
16. 17. To ______ a file means to make a copy of it.
18. In the case of a system failure or the discovery of corrupted files, users _______ the files by copying the backed
up files to their original location on a computer.
19. _______ are the moral guidelines that govern the use of computers and information systems.
20. _______ are the rights to which creators are entitled for their work.
21. An IT _______is a written guideline that helps determine whether a specific computer action is ethical or
unethical.
22. ______refers to the right of individuals and companies to deny or restrict the collection and use of information
about them.
23. ______ is a program placed on a computer without the user’s knowledge that secretly collects information
about the user.
24.______ occurs when a computer consumes someone’s entire social life.
25. 25. Users may have _______ if they have sore, tired, burning, itching or dry eyes, blurred or double vision, or difficulty
focusing on a screen image.
Level 1 Asia Pacific University of Technology and Innovation Page 2