This Study Resource Was
This Study Resource Was
Activity No. 1
DIRECTION: identify terms by filling in the blanks with the correct answer.
1. SOFTWARE SECURITY provides barriers and other cyber –tools that protect
programs, files and the information flow to and from a computer.
2. HARDWARE SECURITY protects the machine and peripheral hardware from
theft and from electronic intrusion and damage.
3. _____________________ are a planned system of working to prevent illness and
injury where you work by recognizing and identifying hazards and risks.
4. COMPUTER VIRUS refers to a program which damages computer systems
m
er as
and/or destroys or erases data files.
co
5. ANTIVIRUS SOFTWARE is a computer program that detects, prevents, and
eH w
takes action to disarm or remove malicious software programs, such as viruses
o.
and worms.
rs e
ou urc
6. A WORM is also a destructive program that fills a computer system with self-
replicating information, clogging the system so that its operations are slowed
o
down or stopped.
aC s
legitimate software.
8. A MACRO VIRUS is a computer virus written in the same macro language that is
ed d
10. COPYRIGHT refers to the legal right of the owner of intellectual property.
Th
sh
This study source was downloaded by 100000829049290 from CourseHero.com on 09-12-2021 06:09:28 GMT -05:00
https://www.coursehero.com/file/76282882/bcompdocx/
Activity No. 2
With the introduction of computers there is a lot of evil that was being spread through
the internet and people using it to cause damages to others. If you are new at some
organization there are some computer ethics you will be expected to follow. So how
knowledgeable are you when it comes to computer ethics? Take up the test below and
get to find out! Encircle the letter of the best answer.
m
D 2. Thou shalt not create_____software or games.
er as
a) Difficult
co
eH w
b) Copyrighted
c) Easy
o.
d) Harmful
rs e
ou urc
B 3. Thou shalt not copy_____software or materials.
a) Public-domain
o
b) Copyrighted
aC s
c) Self-created
vi y re
d) Self-published
d) Thou shalt not use a computer to be nosy or snoop into other people's computer
Th
files.
e) Thou shalt not use a computer to steal.
B 5. Jeruz has walked away from a lab computer without logging off. Trish sits down and,
sh
This study source was downloaded by 100000829049290 from CourseHero.com on 09-12-2021 06:09:28 GMT -05:00
https://www.coursehero.com/file/76282882/bcompdocx/
d) Thou shall not use a computer to steal.
e) Thou shalt not use a computer to be nosy or snoop into other people's computer
files.
6. Kurt Robin sends e-mail to the entire student body inviting them to a BYOB party at
B
his house while his parents are out of town. Lester receives a message from a
system administrator calling him in for a meeting with school officials. He objects
because he feels that his e-mail is his own private business.
a) Thou shall not use a computer to harm other people
b) Thou shall not use other people's computer resources without authorization
c) Thou shall use a computer in ways that show consideration and respect.
d) Thou shall not use a computer to steal.
e) Thou shalt think about the social consequences of the program you are writing or
the system you are designing.
m
er as
7. A secretary on the campus of a tax-supported university has been requested to give
co
C
eH w
her staff password to her supervisor. The supervisor would like to check the
secretary's e-mail when she is not at work to see if departmental-related mail is
o.
rs e
coming in. The secretary is not comfortable giving her password to her supervisor,
ou urc
but is afraid to say no.
a) Thou shall not use a computer to harm other people
b) Thou shall not use other people's computer resources without authorization
o
c) Thou shall use a computer in ways that show consideration and respect.
aC s
e) Thou shalt think about the social consequences of the program you are writing or
the system you are designing.
ed d
8. Patricia figures out that when she is logged into the server, she can look at others'
ar stu
E
directories, make copies of files, and deposit new files. The operating system was
designed to allow this functionality so that people could share their work. Mr.
Krasinski objects when he observes Marla poking around in another student's
is
directory. But Marla responds by saying, "If the system allows me to do it and there's
Th
c) Thou shall use a computer in ways that show consideration and respect.
d) Thou shall not use a computer to steal.
e) Thou shalt not snoop around in other people’s files.
This study source was downloaded by 100000829049290 from CourseHero.com on 09-12-2021 06:09:28 GMT -05:00
https://www.coursehero.com/file/76282882/bcompdocx/
A 9. Tina's e-mail is being diverted and sent out to her entire class. The messages are
quite personal and Tina is very embarrassed. Is this a violation of any
commandments?
a) True
b) False
A 10. Rhia and Marlon are students at San Antonio de Padua High School. They have
designed a Web page devoted to their favorite rock band using their personal disk
space on the school's Web server. They have posted song clips, lyrics, photographs
of each band member, and articles they have found in various Web news sources.
However, school authorities have asked them to shut down their site because of the
obscene content of many of the lyrics. Sharon and Timothy object, noting that their
First Amendment (free speech) rights are being violated. Is this a violation of the ten
commandments?
m
er as
a) True
co
b) False
eH w
o.
rs e
ou urc
o
aC s
vi y re
ed d
ar stu
is
Th
sh
https://www.coursehero.com/file/76282882/bcompdocx/
Activity No. 3
Excluding from the discussion above, give at least 10 Tips on Taking Care of Your
Personal Computers and explain.
1. Keep your computer away from food. The crumbs can fall between the keys and
provide an invitation to small bugs or damage the circuitry.
2. Do not use your computer in a room where animals are. Their fur and hair can get
into the internal workings and damage them. Also larger animals (e.g dogs) can
accidentally damage them by knocking them off their support by brushing past, wagging
tail, tripping over leads etc.
3. When using your computer, always have clean hands. If you clean your hands before
using the computer, the wear and tear of the coating caused by contact with sweat and
m
tiny particles that can damage the surface of the laptop would be minimized.
er as
co
4. Hold and lift the computer by its base, not by its LCD display (the screen). You might
eH w
damage the monitor or the hinges connecting the display to the base if you raise it on
o.
the screen alone. The display is also easily scratched by direct pressure or damaged.
rs e
So, avoiding pressure being put on it.
ou urc
5. Insert drives into their slots carefully and at the correct angle. Pushing the drive too
forcefully into its slot could jam it.
o
aC s
6. Check to see if labels are affixed securely before inserting media into your laptop.
vi y re
CDs, DVDs, or floppy disks should not have any loose labels that may jam inside the
laptop. Never insert undersized CDs, as these can damage the disk player permanently.
7. Don't roll your chair over the computer cord. Stick the cord onto your desk with tape
ed d
or a special computer cord tie which can easily be undone when you've finished using
ar stu
the laptop. Always try to keep the cord away from the floor and your legs.
8. Have the unit cleaned annually to remove internal dust. Get this done by a computer
is
professional, or do it yourself if you can. If dust accumulates, the system will not be able
to cool itself correctly. Heat can destroy the motherboard.
Th
9. Use an old toothbrush to clean the area around the exhaust fan screen. If that gets
plugged up, air flow is diminished and overheating can occur.
sh
10. Make sure that while downloading stuff from the web you do not download
unwanted installers which are usually created to install unwanted softwares which are
provided as freeware for providing the file which you require.
https://www.coursehero.com/file/76282882/bcompdocx/
Powered by TCPDF (www.tcpdf.org)