Wednesday, December 26, 2012

PTI - Chapter 11


Chapter 11
True/False
1.                T
2.                T
3.                F
4.                T
5.                F
6.                T
7.                T
8.                T
9.                F
10.             F
11.             T
12.             F

Multiple Choice
1.       B
2.       D
3.       A
4.       C
5.       C
6.       D
7.       D
8.       C

Matching
1.       J
2.       D
3.       E
4.       G
5.       I
6.       C
7.       B
8.       A
9.       H
10.   F

Short Answer
1.       There are two ways that an antivirus programs detect and identify a virus.
First, it scans/monitors the programs by its code, if it found a program code that matches with the virus code in its signature database, it will consider that program a virus.
Secondly, it scans/monitors the programs by analyzing its behavior, such as modification of critical system files/important data files, if any behavior seems suspicious, then the antivirus program will alert the user that there are suspicious behavior, or it may alert the user that malicious actions are about to be performed, and block that behavior.

 Virus hoax is a message warning the recipient of a non-existent computer virus threat. The message is usually a chain e-mail that tells the recipient to forward it to everyone they know.

2.       Energy star is a joint program of the U.S. Environmental Protection Agency and the U.S. Department of Energy helping us all save money and protect the environment through energy efficient products and practices. Energy efficient choices can save families about a third on their energy bill with similar savings of greenhouse gas emissions, without sacrificing features, style or comfort. Energy star helps you make the energy efficient choice.

How users should handle obsolete computers is the users should recycle obsolete computers properly. Then, the revamped end product would be sold at a low price or donated to the less fortunate in the society.

3.       Information privacy, or data privacy is the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them.

Five ways to safeguard your personal information :
-      Don’t use your primary email address
-      Don’t give out your phone number
-      Don’t give up your birth date
-      Don’t ever give up your credit card number, driver’s lisence number, or social security number
-      Be savvy

4.       Two methods for avoiding phishing attacks :
-      Never fill out forms in e-mail messages that ask for personal financial information
-      If you do provide personal information (like a credit card number), do so only via a secure website or the telephone
How Clickjacking works :
Clickjacking is possible because seemingly harmless features of HTML web pages can be employed to perform unexpected actions. A clickjacked page tricks a user into performing undesired actions by clicking on a concealed link. On a clickjacked page, the attackers load another page over it in a transparent layer. The users think that they are clicking visible buttons, while they are actually performing actions on the hidden page. The hidden page may be an authentic page; therefore, the attackers can trick users into performing actions which the users never intended. There is no way of tracing such actions to the attackers later, as the users would have been genuinely authenticated on the hidden page.


5.       Many businesses use content filtering to limit employees’ Web access. One approach to content filtering is through a rating system of the Internet Content Rating Association (ICRA). Another approach to content filtering is to use filtering software. 
ICRA, which is similar to those used for movies and videos. Major Web sites such as Yahoo!, AOL, and MSN use the rating system established by the ICRA. If the content at the web site goes beyond the rating limits set in the Web browser software, a user cant access the website. Concerned parents can set the rating limits and prevent this limits from being changed by using a password.
 

No comments:

Post a Comment