0% found this document useful (0 votes)
52 views5 pages

This Study Resource Was

The document provides two assessment tasks to test knowledge of computer security and ethics. The first task asks students to identify terms related to computer threats and defenses. The second task presents scenarios and asks students to identify which rules of computer ethics are being followed or violated.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views5 pages

This Study Resource Was

The document provides two assessment tasks to test knowledge of computer security and ethics. The first task asks students to identify terms related to computer threats and defenses. The second task presents scenarios and asks students to identify which rules of computer ethics are being followed or violated.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Assessment Tasks

Activity No. 1

DIRECTION: identify terms by filling in the blanks with the correct answer.

1. SOFTWARE SECURITY provides barriers and other cyber –tools that protect
programs, files and the information flow to and from a computer.
2. HARDWARE SECURITY protects the machine and peripheral hardware from
theft and from electronic intrusion and damage.
3. _____________________ are a planned system of working to prevent illness and
injury where you work by recognizing and identifying hazards and risks.
4. COMPUTER VIRUS refers to a program which damages computer systems

m
er as
and/or destroys or erases data files.

co
5. ANTIVIRUS SOFTWARE is a computer program that detects, prevents, and

eH w
takes action to disarm or remove malicious software programs, such as viruses

o.
and worms.
rs e
ou urc
6. A WORM is also a destructive program that fills a computer system with self-
replicating information, clogging the system so that its operations are slowed
o

down or stopped.
aC s

7. A TROJAN HORSE VIRUS is a type of malware that is often disguised as


vi y re

legitimate software.
8. A MACRO VIRUS is a computer virus written in the same macro language that is
ed d

used for software applications, such as word processing programs.


ar stu

9. SHAREWARE is software that is distributed free on trial basis with the


understanding that the user may need or want to pay for it later.
is

10. COPYRIGHT refers to the legal right of the owner of intellectual property.
Th
sh

This study source was downloaded by 100000829049290 from CourseHero.com on 09-12-2021 06:09:28 GMT -05:00

https://www.coursehero.com/file/76282882/bcompdocx/
Activity No. 2

With the introduction of computers there is a lot of evil that was being spread through
the internet and people using it to cause damages to others. If you are new at some
organization there are some computer ethics you will be expected to follow. So how
knowledgeable are you when it comes to computer ethics? Take up the test below and
get to find out! Encircle the letter of the best answer.

A 1. What is Computer Ethics?


a) An honest moral code that should be followed when on the PC
b) A computer program about trustworthiness
c) A computer that fits on or under a desk
d) A list of commandments in the Bible

m
D 2. Thou shalt not create_____software or games.

er as
a) Difficult

co
eH w
b) Copyrighted
c) Easy

o.
d) Harmful
rs e
ou urc
B 3. Thou shalt not copy_____software or materials.
a) Public-domain
o

b) Copyrighted
aC s

c) Self-created
vi y re

d) Self-published

A 4. Which of the following is NOT a rule listed in Computer Discovery's Ten


ed d

Commandments of Computer Ethics?


ar stu

a) Thou shalt not use a computer to email.


b) Thou shalt not use or copy software for which you have not paid.
c) Thou shalt not use a computer to interfere with other people's computer work.
is

d) Thou shalt not use a computer to be nosy or snoop into other people's computer
Th

files.
e) Thou shalt not use a computer to steal.

B 5. Jeruz has walked away from a lab computer without logging off. Trish sits down and,
sh

still logged in as Jules, sends inflammatory e-mail messages out to a number of


students and posts similar messages on the class newsgroup.
a) Thou shall not use a computer to harm other people
b) Thou shall not use other people's computer resources without authorization
c) Thou shall use a computer in ways that show consideration and respect.

This study source was downloaded by 100000829049290 from CourseHero.com on 09-12-2021 06:09:28 GMT -05:00

https://www.coursehero.com/file/76282882/bcompdocx/
d) Thou shall not use a computer to steal.
e) Thou shalt not use a computer to be nosy or snoop into other people's computer
files.

6. Kurt Robin sends e-mail to the entire student body inviting them to a BYOB party at
B
his house while his parents are out of town. Lester receives a message from a
system administrator calling him in for a meeting with school officials. He objects
because he feels that his e-mail is his own private business.
a) Thou shall not use a computer to harm other people
b) Thou shall not use other people's computer resources without authorization
c) Thou shall use a computer in ways that show consideration and respect.
d) Thou shall not use a computer to steal.
e) Thou shalt think about the social consequences of the program you are writing or
the system you are designing.

m
er as
7. A secretary on the campus of a tax-supported university has been requested to give

co
C

eH w
her staff password to her supervisor. The supervisor would like to check the
secretary's e-mail when she is not at work to see if departmental-related mail is

o.
rs e
coming in. The secretary is not comfortable giving her password to her supervisor,
ou urc
but is afraid to say no.
a) Thou shall not use a computer to harm other people
b) Thou shall not use other people's computer resources without authorization
o

c) Thou shall use a computer in ways that show consideration and respect.
aC s

d) Thou shall not use a computer to steal.


vi y re

e) Thou shalt think about the social consequences of the program you are writing or
the system you are designing.
ed d

8. Patricia figures out that when she is logged into the server, she can look at others'
ar stu

E
directories, make copies of files, and deposit new files. The operating system was
designed to allow this functionality so that people could share their work. Mr.
Krasinski objects when he observes Marla poking around in another student's
is

directory. But Marla responds by saying, "If the system allows me to do it and there's
Th

no specific rule against it, what's the problem?"


a) Thou shall not use a computer to harm other people
b) Thou shall not use other people's computer resources without authorization
sh

c) Thou shall use a computer in ways that show consideration and respect.
d) Thou shall not use a computer to steal.
e) Thou shalt not snoop around in other people’s files.

This study source was downloaded by 100000829049290 from CourseHero.com on 09-12-2021 06:09:28 GMT -05:00

https://www.coursehero.com/file/76282882/bcompdocx/
A 9. Tina's e-mail is being diverted and sent out to her entire class. The messages are
quite personal and Tina is very embarrassed. Is this a violation of any
commandments?
a) True
b) False

A 10. Rhia and Marlon are students at San Antonio de Padua High School. They have
designed a Web page devoted to their favorite rock band using their personal disk
space on the school's Web server. They have posted song clips, lyrics, photographs
of each band member, and articles they have found in various Web news sources.
However, school authorities have asked them to shut down their site because of the
obscene content of many of the lyrics. Sharon and Timothy object, noting that their
First Amendment (free speech) rights are being violated. Is this a violation of the ten
commandments?

m
er as
a) True

co
b) False

eH w
o.
rs e
ou urc
o
aC s
vi y re
ed d
ar stu
is
Th
sh

Kathleen Jewell M. Pono


BSAIS 2B
This study source was downloaded by 100000829049290 from CourseHero.com on 09-12-2021 06:09:28 GMT -05:00

https://www.coursehero.com/file/76282882/bcompdocx/
Activity No. 3

Excluding from the discussion above, give at least 10 Tips on Taking Care of Your
Personal Computers and explain.

1. Keep your computer away from food. The crumbs can fall between the keys and
provide an invitation to small bugs or damage the circuitry.

2. Do not use your computer in a room where animals are. Their fur and hair can get
into the internal workings and damage them. Also larger animals (e.g dogs) can
accidentally damage them by knocking them off their support by brushing past, wagging
tail, tripping over leads etc.

3. When using your computer, always have clean hands. If you clean your hands before
using the computer, the wear and tear of the coating caused by contact with sweat and

m
tiny particles that can damage the surface of the laptop would be minimized.

er as
co
4. Hold and lift the computer by its base, not by its LCD display (the screen). You might

eH w
damage the monitor or the hinges connecting the display to the base if you raise it on

o.
the screen alone. The display is also easily scratched by direct pressure or damaged.
rs e
So, avoiding pressure being put on it.
ou urc
5. Insert drives into their slots carefully and at the correct angle. Pushing the drive too
forcefully into its slot could jam it.
o
aC s

6. Check to see if labels are affixed securely before inserting media into your laptop.
vi y re

CDs, DVDs, or floppy disks should not have any loose labels that may jam inside the
laptop. Never insert undersized CDs, as these can damage the disk player permanently.

7. Don't roll your chair over the computer cord. Stick the cord onto your desk with tape
ed d

or a special computer cord tie which can easily be undone when you've finished using
ar stu

the laptop. Always try to keep the cord away from the floor and your legs.

8. Have the unit cleaned annually to remove internal dust. Get this done by a computer
is

professional, or do it yourself if you can. If dust accumulates, the system will not be able
to cool itself correctly. Heat can destroy the motherboard.
Th

9. Use an old toothbrush to clean the area around the exhaust fan screen. If that gets
plugged up, air flow is diminished and overheating can occur.
sh

10. Make sure that while downloading stuff from the web you do not download
unwanted installers which are usually created to install unwanted softwares which are
provided as freeware for providing the file which you require.

Kathleen Jewell M. Pono


BSAIS 2B
This study source was downloaded by 100000829049290 from CourseHero.com on 09-12-2021 06:09:28 GMT -05:00

https://www.coursehero.com/file/76282882/bcompdocx/
Powered by TCPDF (www.tcpdf.org)

You might also like