Wednesday, December 26, 2012

PTI - Chapter 11


Chapter 11
True/False
1.                T
2.                T
3.                F
4.                T
5.                F
6.                T
7.                T
8.                T
9.                F
10.             F
11.             T
12.             F

Multiple Choice
1.       B
2.       D
3.       A
4.       C
5.       C
6.       D
7.       D
8.       C

Matching
1.       J
2.       D
3.       E
4.       G
5.       I
6.       C
7.       B
8.       A
9.       H
10.   F

Short Answer
1.       There are two ways that an antivirus programs detect and identify a virus.
First, it scans/monitors the programs by its code, if it found a program code that matches with the virus code in its signature database, it will consider that program a virus.
Secondly, it scans/monitors the programs by analyzing its behavior, such as modification of critical system files/important data files, if any behavior seems suspicious, then the antivirus program will alert the user that there are suspicious behavior, or it may alert the user that malicious actions are about to be performed, and block that behavior.

 Virus hoax is a message warning the recipient of a non-existent computer virus threat. The message is usually a chain e-mail that tells the recipient to forward it to everyone they know.

2.       Energy star is a joint program of the U.S. Environmental Protection Agency and the U.S. Department of Energy helping us all save money and protect the environment through energy efficient products and practices. Energy efficient choices can save families about a third on their energy bill with similar savings of greenhouse gas emissions, without sacrificing features, style or comfort. Energy star helps you make the energy efficient choice.

How users should handle obsolete computers is the users should recycle obsolete computers properly. Then, the revamped end product would be sold at a low price or donated to the less fortunate in the society.

3.       Information privacy, or data privacy is the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them.

Five ways to safeguard your personal information :
-      Don’t use your primary email address
-      Don’t give out your phone number
-      Don’t give up your birth date
-      Don’t ever give up your credit card number, driver’s lisence number, or social security number
-      Be savvy

4.       Two methods for avoiding phishing attacks :
-      Never fill out forms in e-mail messages that ask for personal financial information
-      If you do provide personal information (like a credit card number), do so only via a secure website or the telephone
How Clickjacking works :
Clickjacking is possible because seemingly harmless features of HTML web pages can be employed to perform unexpected actions. A clickjacked page tricks a user into performing undesired actions by clicking on a concealed link. On a clickjacked page, the attackers load another page over it in a transparent layer. The users think that they are clicking visible buttons, while they are actually performing actions on the hidden page. The hidden page may be an authentic page; therefore, the attackers can trick users into performing actions which the users never intended. There is no way of tracing such actions to the attackers later, as the users would have been genuinely authenticated on the hidden page.


5.       Many businesses use content filtering to limit employees’ Web access. One approach to content filtering is through a rating system of the Internet Content Rating Association (ICRA). Another approach to content filtering is to use filtering software. 
ICRA, which is similar to those used for movies and videos. Major Web sites such as Yahoo!, AOL, and MSN use the rating system established by the ICRA. If the content at the web site goes beyond the rating limits set in the Web browser software, a user cant access the website. Concerned parents can set the rating limits and prevent this limits from being changed by using a password.
 

Tuesday, December 25, 2012

PTI - Chapter 10

I.     True/False



    1.   T

    2.   T

    3.   F

    4.   T

    5.   F

    6.   F

    7.   T

    8.   T

    9.   F

    10. T



II.     Multiple Choices

    1. B

    2. A

    3. D

    4. B

    5. A

    6. B

    7. B

    8. A



III.     Matching

    1.  E

    2.  G

    3.  C

    4.  B

    5.  J

    6.  A

    7.   I

    8.  D

    9.  H

    10. F



IV.     Short Answer


1.   Validation is the process of comparing data with a set of rules or values to find out if the data is correct.

Five types of validity checks: Alphabetic checks, Numeric checks, Range checks, Consistency checks, Completeness checks.


2.    In data redundancy each department or area in an organization has its own files in a file processing system, by duplicating data it wastes resources such as storage space and people’s time, also data redundancy can increase the chance of error.

Isolated data often it’s difficult to access data stored in separate files in different department. Sharing data from multiple, separate files to generate such a list in a file processing system often is a complicated procedure and usually requires the experience of a computer programmer.


3.   When an organization uses a database approach, many programs and users share the data in the database.

Five strengths of the database approach:


·         Reduces Data Redundancy, most data items are stored in only one file, which greatly reduces duplicated data.

·         Improved data Integrity, when users modify data in the database, they make change to one file instead of multiple files.

·         Shared data, The data in a database environment belongs to and is shared, usually over a network, by the entire organization.

·         Easier Access, the database approach allows nontechnical users to access and maintain data, providing they have the necessary privileges.

·         Reduces Development Time, it often is easier and faster to develop programs that use the database approach.


4.   How to use a Simple Query Wizard:

·         Select the fields from the Available Fields list you want to be displayed in the resulting query.

·         Assign a name to the query, so that you can open it later.

·         View the query result on the screen.

Query by example is a feature that has a graphical user interface to assist users with retrieving data.


5.   Advantages of object-oriented database:

They can store more type of data, access this data faster, and allow programmers to reuse object.

Four examples of object-oriented database:

·         A multimedia database stores images, audio clips, and/or video clips, for example, a GIS database stores maps and other geographic data.

·         A groupware database stores documents such as schedules, calendars, manuals, memos, and reports.

·         A computer-aided design database stores data about engineering, architectural, and scientific design.

·         A hypertext database contains text links to other types of documents. A hypermedia database contains test, graphic, video, and sound.