0% found this document useful (0 votes)
30 views2 pages

Tutorial 11 Digital Security - Question

The document is a tutorial on digital security, focusing on various threats and protective measures in computing. It includes review questions related to computer viruses, data protection, unauthorized access, and ethical guidelines in IT. Key concepts such as DoS attacks, encryption, and user privacy rights are also addressed.

Uploaded by

Xinn Leonheart
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views2 pages

Tutorial 11 Digital Security - Question

The document is a tutorial on digital security, focusing on various threats and protective measures in computing. It includes review questions related to computer viruses, data protection, unauthorized access, and ethical guidelines in IT. Key concepts such as DoS attacks, encryption, and user privacy rights are also addressed.

Uploaded by

Xinn Leonheart
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

CT006-3-1 Computing and IT at the Workplace Digital Security

DGTIN – Digital Thinking and Innovation

Tutorial 11 – Digital Security

SECTION A

Review Questions
1. A _______ is any event or action that could cause a loss of or damage to computer hardware, software, data,
information or processing capability.

2. Computer viruses, worms, and Trojan horses are classified as _______which are programs that act
without a user’s knowledge and deliberately alter the computer’s operations.

Figure 11-3

3. As shown in Figure 11-3, a(n) ______ protects a computer against viruses by identifying and removing any
computer viruses found in memory, on storage media or on incoming files.

4. A more devastating type of DoS attack is the ______in which multiple unsuspecting computers are used to
attack multiple computer networks.

5. _______ is a regular plan of copying and storing data and program files.
6. A(n) _____ is a utility program that detects and protects a personal computer and its data from unauthorized
access.
7. An _______automatically analyzes all network traffic, assesses system vulnerabilities, identifies any
unauthorized access (intrusions), and notifies a network administrator of suspicious behaviour patterns or system
breaches.

Figure 11-2

8. Many Web sites, like that in Figure 11-2, require a user to enter a(n) _______ which is a unique combination of
characters such as alphabets or numbers.

Level 1 Asia Pacific University of Technology and Innovation Page 1


CT006-3-1 Computing and IT at the Workplace Digital Security

7. 9. Many Web sites, like in Figure 11-2, require a user to enter a(n) _______ which is a private combination of characters
associated with a user-name that allows access to certain computer resources.

8. 10. _________ occurs when someone steals software media, intentionally erases software or illegally copies a software
program.

9. 11. Software ________ is the unauthorized and illegal duplication of copyrighted software.

10. 12. ________ occurs when someone steals personal or confidential information.

11. 13. To read encrypted data the recipient must ______ or decipher it into a readable form.

12. 14. A ________ is the prolonged malfunction of a computer.

14.
13. 15. _______ is any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer.

15. 16. A(n) ______ is a drop in electrical supply

16. 17. To ______ a file means to make a copy of it.

18. In the case of a system failure or the discovery of corrupted files, users _______ the files by copying the backed
up files to their original location on a computer.

19. _______ are the moral guidelines that govern the use of computers and information systems.

20. _______ are the rights to which creators are entitled for their work.

21. An IT _______is a written guideline that helps determine whether a specific computer action is ethical or
unethical.
22. ______refers to the right of individuals and companies to deny or restrict the collection and use of information
about them.
23. ______ is a program placed on a computer without the user’s knowledge that secretly collects information
about the user.
24.______ occurs when a computer consumes someone’s entire social life.
25. 25. Users may have _______ if they have sore, tired, burning, itching or dry eyes, blurred or double vision, or difficulty
focusing on a screen image.

Level 1 Asia Pacific University of Technology and Innovation Page 2

You might also like