livingmylivetothefullest

It's about life

Answer of Mr. Tri Djoko Assignment Chapter 11

True/False

1. False 7. True
2. True 8. True
3. False 9. False
4. True 10. False
5. False 11. True
6. True 12. False

Multiple Choice

1. B 5. C
2. D 6. D
3. A 7. D
4. C 8. C

Matching

1. J 6. C
2. D 7. B
3. E 8. A
4. G 9. H
5. I 10. F

Short Answer

  1. There are two ways that an antivirus programs detect and identify a virus.
    First, it scans/monitors the programs by its code, if it found a program code that matches with the virus code in its signature database, it will consider that program a virus.
    Secondly, it scans/monitors the programs by analyzing its behavior, such as modification of critical system files/important data files, if any behavior seems suspicious, then the antivirus program will alert the user that there are suspicious behavior, or it may alert the user that malicious actions are about to be performed, and block that behavior.
    Virus hoax is a message warning the recipient of a non-existent computer virus threat.
  2. Energy Star ® is a program that was first developed in 1992 by the US Environmental Protection Agency (EPA) as a method to identify and promote products that are energy efficient. Products carrying this symbol provide a way for businesses and consumers to save money, while at the same time, protect our environment. Since its initial onset, the government has partnered with other industry members, to promote and expand the scope of this project to include, not only major appliances, but also new homes and buildings.
    Users should not store obsolete computers and devices in their basement, storage room, attic, warehouse, or any other location. Computers, monitors, and other equipment contain toxic materials and potentially dangerous elements including lead, mercury, and flame retardants. In a landfill, these materials release into the environment. Recycling and refurbishing old equipment are much safer alternatives for the environment. Manufacturers can use the millions of pounds of recycled raw materials to make products such as outdoor furniture and automotive parts.
  3. Information privacy is the privacy of personal information and usually relates to personal data stored on computer systems.
    Five ways to safeguard your personal information :
    a. First protect your social security number and other identifying information. If you live with roommates, you need to keep it in a place where they will not be able to access the information. If you carry your social security number with you at all times you are increasing the chance that it will be stolen while you are out.
    b. Second be aware of what you are throwing away. It is much safer to shred old bank account statements and other information than to just put it out in the trash. If you are storing these old statements, you should keep them in an area where others cannot access them.
    c. Protect yourself from phishing scams. These can take place over the phone or the Internet. Someone will contact you claiming that there is a problem with your account. Then they will request information such as your social security number, in order to verify who you are. The information they get will give them the chance to steal your identity. Over the Internet, they will direct you to a false sign in page, and steal your I.D. number and password, and then gain access to your information.
    d. Regularly check your credit report. You should check your credit report annually. You can do this for free once a year. Since you have access to three reporting agencies, you can rotate through each of them, and check one every four months. The sooner you catch identity theft, the easier it is to stop and reverse the effects of it.
    e. Consider purchasing identity theft insurance. This insurance is designed to help you deal with the banks and credit card companies once your identity has been stolen. They also monitor your credit report very closely. You should look for a plan that will help you to deal with the creditors specifically, as some plans do not offer that protection.
  4. Keep antivirus up to date, Do not click on hyperlinks in e-mails, don’t enter sensitive or financial information into pop-up windows.
    Clickjacking occurs when a malicious program is embedded into a Web site. This program hovers under the user’s mouse. Once the user clicks, usually on a link but it can be anywhere on the page, a new Web site may appear or software may be downloaded and clickjacking has occurred.
  5. Many businesses use content filtering to limit employees’ Web access. These businesses argue that employees are unproductive when visiting inappropriate or objectionable Web sites. Some schools, libraries, and parents use content filtering to restrict access to minors.
    One approach to content filtering is through a rating system of the Internet Content Rating Association (ICRA), which is similar to those used for movies and videos. Major Web sites such as Yahoo!, AOL, and MSN use the rating system established by the ICRA. If content at the Web site goes beyond the rating limits set in the Web browser software, a user cannot access the Web site. Concerned parents can set the rating limits and prevent these limits from being changed by using a password.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Information

This entry was posted on January 17, 2013 by .
January 2013
M T W T F S S
« Dec   Mar »
 123456
78910111213
14151617181920
21222324252627
28293031  

Blog Stats

  • 6,909 hits
%d bloggers like this: