BSA Bcomp-AT 4 - adasfadhgfjd PDF

Title BSA Bcomp-AT 4 - adasfadhgfjd
Author Joash Lee Acebron
Course Contemporary Arts
Institution Laguna University
Pages 4
File Size 124.2 KB
File Type PDF
Total Downloads 86
Total Views 154

Summary

adasfadhgfjd...


Description

Assessment Task Activity No. 1 DIRECTION: Identify terms by filling in the blanks with the correct answer.

1. Software security provides barriers and other cyber-tools that protect programs, files, and the information flow to and from a computer. 2. Hardware security protects the machine and peripheral hardware from theft and from electronic intrusion and damage. 3. Occupational Health and Safety are a planned system of working to prevent illness and injury where you work by recognizing and identifying hazards and risks. 4. Computer virus refers to a program which damages computer systems and/or destroys or erases data files. 5. Antivirus software is a computer program that detects, prevents, and takes action to disarm or remove malicious software programs, such as viruses and worms. 6. A Worm is also a destructive program that fills a computer system with self-replicating information, clogging the system so that its operations are slowed down or stopped. 7. A Trojan Horse Virus is a type of malware that is often disguised as legitimate software. 8. A Macro Virus is a computer virus written in the same macro language that is used for software applications, such as word processing programs. 9. Shareware is software that is distributed free on a trial basis with the understanding that the user may need or want to pay for it later. 10. Copyright protects refers to the legal right of the owner of intellectual property.

Activity No. 2 With the introduction of computers there is a lot of evil that was being spread through the internet and people using it to cause damages to others. If you are new at some organization there are some computer ethics you will be expected to follow. So how knowledgeable are you when it comes to computer ethics? Take up the test below and get to find out! Encircle the letter of the best answer. 1. What is Computer Ethics? a. An honest moral code that should be followed when on the PC b. A computer program about trustworthiness c. A computer that fits on or under a desk d. A list of commandments in the Bible 2. Thou shalt not create ______________________ software or games. a. Difficult b. Copyrighted c. Easy d. Harmful 3. Thou shalt not copy ___________________________ software or materials. a. Public-domain b. Copyrighted c. Self-created d. Self-published 4. Which of the following is NOT a rule listed in Computer Discovery's Ten Commandments of Computer Ethics? a. Thou shalt not use a computer to email. b. Thou shalt not use or copy software for which you have not paid. c. Thou shalt not use a computer to interfere with other people's computer work. d. Thou shalt not use a computer to be nosy or snoop into other people's computer files. e. Thou shalt not use a computer to steal. 5. Jeruz has walked away from a lab computer without logging off. Trish sits down and, still logged in as Jules, sends inflammatory e-mail messages out to a number of students and posts similar messages on the class newsgroup. a. Thou shall not use a computer to harm other people b. Thou shall not use other people's computer resources without authorization c. Thou shall use a computer in ways that show consideration and respect. d. Thou shall not use a computer to steal. e. Thou shalt not use a computer to be nosy or snoop into other people's computer files. 6. Kurt Robin sends e-mail to the entire student body inviting them to a BYOB party at his house while his parents are out of town. Lester receives a message from a system administrator

calling him in for a meeting with school officials. He objects because he feels that his e-mail is his own private business. a. Thou shall not use a computer to harm other people b. Thou shall not use other people's computer resources without authorization c. Thou shall use a computer in ways that show consideration and respect. d. Thou shall not use a computer to steal. e. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 7. A secretary on the campus of a tax-supported university has been requested to give her staff password to her supervisor. The supervisor would like to check the secretary's e-mail when she is not at work to see if departmental-related mail is coming in. The secretary is not comfortable giving her password to her supervisor, but is afraid to say no. a. Thou shall not use a computer to harm other people b. Thou shall not use other people's computer resources without authorization c. Thou shall use a computer in ways that show consideration and respect. d. Thou shall not use a computer to steal. e. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 8. Patricia figures out that when she is logged into the server, she can look at others' directories, make copies of files, and deposit new files. The operating system was designed to allow this functionality so that people could share their work. Mr. Krasinski objects when he observes Marla poking around in another student's directory. But Marla responds by saying, "If the system allows me to do it and there's no specific rule against it, what's the problem?" a. Thou shall not use a computer to harm other people b. Thou shall not use other people's computer resources without authorization c. Thou shall use a computer in ways that show consideration and respect. d. Thou shall not use a computer to steal. e. Thou shalt not snoop around in other people’s files. 9. Tina's e-mail is being diverted and sent out to her entire class. The messages are quite personal and Tina is very embarrassed. Is this a violation of any commandments? a. True b. False 10. Rhia and Marlon are students at San Antonio de Padua High School. They have designed a Web page devoted to their favorite rock band using their personal disk space on the school's Web server. They have posted song clips, lyrics, photographs of each band member, and articles they have found in various Web news sources. However, school authorities have asked them to shut down their site because of the obscene content of many of the lyrics. Sharon and Timothy object, noting that their First Amendment (free speech) rights are being violated. Is this a violation of the ten commandments? a. True b. False

Activity No. 3 Excluding from the discussion above. Give at least 10 Tips on Taking Care of Your Personal Computers and explain. 1. Do not put liquids nearby the computer . As it may disrupt the functions of the device. Water can destroy a vast amount of electronics of a computer, so avoid putting liquids near the device. 2. Have an antivirus to help protect you from dangerous sites and viruses. Even though the most secure sites can have a few holes where malicious people can put viruses in. 3. Avoid shady sites. Shady or untrustworthy sites are sure to have many viruses and other malware in them. This can not only slow down or disrupt your computer, it can also destroy and take advantage of your computer 4. Keep food away from your computer . The food residues, crumbs, etc. can attract bugs, mice and other small animals that may chew and disrupt the electronics of your computer. The crumbs and food residue may also get in the gaps of your device. 5. Avoid using your computer in a room with animals. Animals do not always understand what they are doing. Some times cats can leap unto keyboards, which can leave fur that can lodge in crevices of the keyboard. 6. Protect the display monitor. The display monitor is what most people call the screen. Protect this from any sharp objects, blunt objects and generally heavy objects can destroy components if not the whole display monitor. 7. Be mindful of the computer cords. Be careful with your computer cords as they are vital in the running of the device. The cords if not properly taken care of and arranged can also lead to you tripping over them. 8. Be sure to plug accessory devices into their proper slots. Not putting the accessory devices in their proper slots will not allow them to function properly. It can also damage both the slot and the accessory device. 9. Have proper ventilation for your computer. Having proper ventilation to help the computer cool down is a necessity as the functions of the computer require to be at a certain temperature to function properly. 10. If you have a laptop don’t use it on the bed. The laptop will suck in dust form the bed and can disrupt the functions of the device. The heat can also be insulated making the laptop overheat if used in a prolonged fashion....


Similar Free PDFs