Wednesday 16 January 2013

Chapter 11


Discovering Computers 2011 : Living in a Digital World Answer

True/False


1.  True 
2.  True 
3.  False 
4.  True 
5.  False 
6.  True 
7.  True
8.  True
9.  False
10.False
11.True
12.False



Multiple Choice

1.B 
2.D 
3.A 
4.C 
5.C
6.D
7.D
8.C


Matching

1.  J
2.  D
3.  E
4.  G
5.  I
6.  C
7.  B
8.  A
9.  H

Short Answer


1. Antivirus programs has a database that contains behaviours / commands that is classified as a virus’ actions in order to damage the victim’s computer. 

When a command is executed by the computer, the antivirus intervenes and check whether the command is safe or not for the computer. If it is not, then the antivirus will classify the executing program as a virus.

A computer virus hoax is a message warning the recipient of a non-existent computer virus threat. The message is usually a chain e-mail that tells the recipient to forward it to everyone they know.

2. ENERGY STAR program is Program developed by the United States Department of Energy and the United States Environment Protection Agency to help reduce the amount of electricity used by computers and other related devices.

Obsolete Computers should not be stored as they contain hazardous materials. Instead, they should be recycled or refurbished.

3. Information Privacy refers to the rights of individuals and companies to deny or restrict the collection and use of information about them.

Fill in only necessary information on rebate, warranty, and registration forms. Do not preprint your telephone number or Social Security number on personal checks. 

Have an unlisted or unpublished telephone number, if Caller ID is available in your area, find out how to block your number from displaying on the receiver’s system. Do not write your telephone number on charge / credit receipts.

4. Visit a website directly to determine if it is legitimate and never click a link in an email message.

Scam in which an object that can be clicked on a Web site, such as a button, image, or link, contains a malicious program

5. Many businesses use content filtering to limit employee’s web access. Schools, libraries and parents use content filtering to restrict access to minors.

Rating system developed by the Internet Content Rating Association (ICRA). These rating limits set by the ICRA are similar to the ones used for movies and videos. 

If content of a Web site goes beyond the rating limits set in the Web browser software, a user cannot access the Web site

0 comments:

Post a Comment