In: Computer Science
1. Match the term with the definition
Malware
[ Choose ] any software specifically designed to damage a computer system without owner knowledge. Although it is often legal and used by big companies such as Verizon and Panasonic, it can be used by illegitimate companies promoting pornography or gambling. Software that's planted on a computer; redirects to impostor web page even though you type in the right URL. You can protect yourself against it by going to websites that contain https not http. is misleading software that is secretly installed on a computer through the web. Confidential information can be obtained by the installer such as passwords, keystrokes and email addresses. A systems that extract features from speech patterns in order to recognize someones voice which is then digitalized and stored.
Spyware
[ Choose ] any software specifically designed to damage a computer system without owner knowledge. Although it is often legal and used by big companies such as Verizon and Panasonic, it can be used by illegitimate companies promoting pornography or gambling. Software that's planted on a computer; redirects to impostor web page even though you type in the right URL. You can protect yourself against it by going to websites that contain https not http. is misleading software that is secretly installed on a computer through the web. Confidential information can be obtained by the installer such as passwords, keystrokes and email addresses. A systems that extract features from speech patterns in order to recognize someones voice which is then digitalized and stored.
Adware
[ Choose ] any software specifically designed to damage a computer system without owner knowledge. Although it is often legal and used by big companies such as Verizon and Panasonic, it can be used by illegitimate companies promoting pornography or gambling. Software that's planted on a computer; redirects to impostor web page even though you type in the right URL. You can protect yourself against it by going to websites that contain https not http. is misleading software that is secretly installed on a computer through the web. Confidential information can be obtained by the installer such as passwords, keystrokes and email addresses. A systems that extract features from speech patterns in order to recognize someones voice which is then digitalized and stored.
Pharm
[ Choose ] any software specifically designed to damage a computer system without owner knowledge. Although it is often legal and used by big companies such as Verizon and Panasonic, it can be used by illegitimate companies promoting pornography or gambling. Software that's planted on a computer; redirects to impostor web page even though you type in the right URL. You can protect yourself against it by going to websites that contain https not http. is misleading software that is secretly installed on a computer through the web. Confidential information can be obtained by the installer such as passwords, keystrokes and email addresses. A systems that extract features from speech patterns in order to recognize someones voice which is then digitalized and stored.
voice
[ Choose ] any software specifically designed to damage a computer system without owner knowledge. Although it is often legal and used by big companies such as Verizon and Panasonic, it can be used by illegitimate companies promoting pornography or gambling. Software that's planted on a computer; redirects to impostor web page even though you type in the right URL. You can protect yourself against it by going to websites that contain https not http. is misleading software that is secretly installed on a computer through the web. Confidential information can be obtained by the installer such as passwords, keystrokes and email addresses. A systems that extract features from speech patterns in order to recognize someones voice which is then digitalized and stored.
2.What prevention technique did the American Library Association suggest for youth using the Internet?
3. What is Biometrics and where was it said to have started?
4. Why do we have passwords and what ancient civilization was reported to use it?
5. Why do computer systems have firewalls?
6. According to your readings, what are a Trojan horse, a virus, and a worm? Highlight their differences.
7. Authentication is used to determine that you are who you are. Authorization refers to resources to which you have access. They are two very different security items.
One of the rising stars of authentication is Biometrics. Discuss two forms of biometric authentication and explain how they can add to the security of a person's identity.
8. Briefly explain the difference in a boot sector virus, a macro virus, and a logic bomb.
9. What did Lamarr, a film star from the late 1930s to the 1950s, assist in inventing and how many frequencies did it range?
10. In your words, what is cyberterrorism? Make sure the answer is your own.
Question 2 :
Suggestions of American Library Association -
(i) Minors should only retrieve, interact with the information posted in the school's or library's website.
(ii) Minors should not see pornography.
(iii) Do not share their information on internet.
(iv) Use social media occasionally.
Question 3 :
Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics. The technology is mainly used for identification and access control, or for identifying individuals who are under surveillance. The basic premise of biometric authentication is that every person can be accurately identified by his or her intrinsic physical or behavioral traits.
Biometrics was first used in Argentina. Fingerprints of criminals in were collected there so as to uniquely distinguish them.
Question 4 :
Password is used to keep the data, information or any other thing safe from unwanted users. It is used to authenticate the identification of the user. Passwords are the most common way to prove your identity when using websites, email accounts and your computer itself. The use of strong passwords is therefore essential in order to protect your security and identity. The best security in the world is useless if a malicious person has a legitimate user name and password.
Ancient Rome used password.
Question 5 :
Computers have firewall because
(i) A firewall protects computer from unauthorized remote access. (ii) Firewalls can block messages linking to unwanted content. (iii) Firewalls make online gaming safer. (iv) Unsuitable or immoral content with a firewall can be blocked.