Question

In: Computer Science

1. Match the term with the definition Malware       [ Choose ]           ...

1. Match the term with the definition

Malware

      [ Choose ]            any software specifically designed to damage a computer system without owner knowledge.            Although it is often legal and used by big companies such as Verizon and Panasonic, it can be used by illegitimate companies promoting pornography or gambling.            Software that's planted on a computer; redirects to impostor web page even though you type in the right URL. You can protect yourself against it by going to websites that contain https not http.            is misleading software that is secretly installed on a computer through the web. Confidential information can be obtained by the installer such as passwords, keystrokes and email addresses.            A systems that extract features from speech patterns in order to recognize someones voice which is then digitalized and stored.      

Spyware

      [ Choose ]            any software specifically designed to damage a computer system without owner knowledge.            Although it is often legal and used by big companies such as Verizon and Panasonic, it can be used by illegitimate companies promoting pornography or gambling.            Software that's planted on a computer; redirects to impostor web page even though you type in the right URL. You can protect yourself against it by going to websites that contain https not http.            is misleading software that is secretly installed on a computer through the web. Confidential information can be obtained by the installer such as passwords, keystrokes and email addresses.            A systems that extract features from speech patterns in order to recognize someones voice which is then digitalized and stored.      

Adware

      [ Choose ]            any software specifically designed to damage a computer system without owner knowledge.            Although it is often legal and used by big companies such as Verizon and Panasonic, it can be used by illegitimate companies promoting pornography or gambling.            Software that's planted on a computer; redirects to impostor web page even though you type in the right URL. You can protect yourself against it by going to websites that contain https not http.            is misleading software that is secretly installed on a computer through the web. Confidential information can be obtained by the installer such as passwords, keystrokes and email addresses.            A systems that extract features from speech patterns in order to recognize someones voice which is then digitalized and stored.      

Pharm

      [ Choose ]            any software specifically designed to damage a computer system without owner knowledge.            Although it is often legal and used by big companies such as Verizon and Panasonic, it can be used by illegitimate companies promoting pornography or gambling.            Software that's planted on a computer; redirects to impostor web page even though you type in the right URL. You can protect yourself against it by going to websites that contain https not http.            is misleading software that is secretly installed on a computer through the web. Confidential information can be obtained by the installer such as passwords, keystrokes and email addresses.            A systems that extract features from speech patterns in order to recognize someones voice which is then digitalized and stored.      

voice

      [ Choose ]            any software specifically designed to damage a computer system without owner knowledge.            Although it is often legal and used by big companies such as Verizon and Panasonic, it can be used by illegitimate companies promoting pornography or gambling.            Software that's planted on a computer; redirects to impostor web page even though you type in the right URL. You can protect yourself against it by going to websites that contain https not http.            is misleading software that is secretly installed on a computer through the web. Confidential information can be obtained by the installer such as passwords, keystrokes and email addresses.            A systems that extract features from speech patterns in order to recognize someones voice which is then digitalized and stored.      

2.What prevention technique did the American Library Association suggest for youth using the Internet?

3. What is Biometrics and where was it said to have started?

4. Why do we have passwords and what ancient civilization was reported to use it?

5. Why do computer systems have firewalls?

6. According to your readings, what are a Trojan horse, a virus, and a worm? Highlight their differences.

7. Authentication is used to determine that you are who you are. Authorization refers to resources to which you have access. They are two very different security items.

One of the rising stars of authentication is Biometrics. Discuss two forms of biometric authentication and explain how they can add to the security of a person's identity.

8. Briefly explain the difference in a boot sector virus, a macro virus, and a logic bomb.

9. What did Lamarr, a film star from the late 1930s to the 1950s, assist in inventing and how many frequencies did it range?

10. In your words, what is cyberterrorism? Make sure the answer is your own.

Solutions

Expert Solution

Question 2 :

Suggestions of American Library Association -

(i) Minors should only retrieve, interact with the information posted in the school's or library's website.

(ii) Minors should not see pornography.

(iii) Do not share their information on internet.

(iv) Use social media occasionally.

Question 3 :

Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics. The technology is mainly used for identification and access control, or for identifying individuals who are under surveillance. The basic premise of biometric authentication is that every person can be accurately identified by his or her intrinsic physical or behavioral traits.

Biometrics was first used in Argentina. Fingerprints of criminals in were collected there so as to uniquely distinguish them.

Question 4 :

Password is used to keep the data, information or any other thing safe from unwanted users. It is used to authenticate the identification of the user. Passwords are the most common way to prove your identity when using websites, email accounts and your computer itself. The use of strong passwords is therefore essential in order to protect your security and identity. The best security in the world is useless if a malicious person has a legitimate user name and password.

Ancient Rome used password.

Question 5 :

Computers have firewall because

(i) A firewall protects computer from unauthorized remote access. (ii) Firewalls can block messages linking to unwanted content. (iii) Firewalls make online gaming safer. (iv) Unsuitable or immoral content with a firewall can be blocked.


Related Solutions

Match each term with its definition.
Match each term with its definition.a sequence of DNA located upstream of a gene that signals the start of transcriptiona regulatory protein that blocks transcription by binding to the operator sitean element that disrupts the signal between enhancers and promotersa gene that controls the expression of one or more genes by promoting or inhibiting transcriptiona molecule that activates mRNA synthesis by disabling the protein that prevents transcription a short sequence of DNA located near the promoter region that is recognized...
Match the definition with the correct term.       -       A.       B....
Match the definition with the correct term.       -       A.       B.       C.       D.       E.       F.       G.       H.       I.       J.       K.       L.    Costing process that traces costs to units based on multiple identified activities.       -       A.       B.       C.       D.       E.       F....
Match the definition with the correct term.       -       A.       B....
Match the definition with the correct term.       -       A.       B.       C.       D.       E.       F.       G.       H.       I.       J.       K.       L.    Organizational unit of a factory responsible for partially manufacturing units.       -       A.       B.       C.       D.       E.       F.      ...
Part 1: Match the term with the appropriate income taxes related definition. Term Definition Timing difference:...
Part 1: Match the term with the appropriate income taxes related definition. Term Definition Timing difference: _______ A. Taxable income higher than pretax financial income—in the future Taxable income: _______ B. Organization responsible for the Internal Revenue Code FASB: _______ C. Amount that reduces income taxes payable Deduction: _______ D. Reported U.S. GAAP revenues or expenses are not the same amounts as reported tax income or tax deductions IRS: _______ E. Taxable income lower than pretax financial income—in the future...
Definition Match the term with the appropriate stock option related definition. Term Definition Exercise price: _______...
Definition Match the term with the appropriate stock option related definition. Term Definition Exercise price: _______ A. Period over which employees perform service—time between the grant date and the vesting date Exercise period: _______ B. Value determined using an option pricing model Service period: _______ C. Options where current stock price > exercise price Fair value amount: _______ D. Options where current stock price < exercise price Under water options: _______ E. Period employees may exercise their options—time between the...
Match each titration term with its definition
Match each titration term with its definitionGlassware that allows a solution to be precisely and slowly added to another solution Choose...When the required amount of one solution has been added to the second solution to complete the reaction Choose...Process of slowly adding a solution to react with another solution and determine the concentration of one of the solutions based on the reaction between them Choose...A reagent added to the analyte solution that changes color when the reaction is complete ChooseSolution...
Match each term to the correct definition or description.       -       A.   ...
Match each term to the correct definition or description.       -       A.       B.       C.       D.       E.       F.       G.       H.       I.       J.       K.       L.       M.       N.       O.    Efferent neurons       -       A.       B.       C.       D.       E.      ...
Match the term to the definition. There are NO DUPLICATES in this set. A decision for...
Match the term to the definition. There are NO DUPLICATES in this set. A decision for the loss-minimizing producer to cease production but not go out of business A group of firms that agree to coordinate their production and pricing decisions to maximize group profits The condition that exists when market output is produced using the least-cost combination of inputs, given the level of technology. To maximize profit or minimize loss, a firm should produce the quantity at which MR...
Part A. Match the letter of the definition/statement in Column 1 to the term in Column...
Part A. Match the letter of the definition/statement in Column 1 to the term in Column 2 to which the definition corresponds/that completes the statement. (15 points) Definitions/Statements Corresponding Term A. _____ is the transmission of a message from a sender to a receiver via a medium (or channel) of transmission. 1. Non-traditional media _____ B. ____ include family members, friends, classmates, fellow consumers. 2. Order presentation _____ C. One of the barriers to communication is clutter from competing communication...
Please match off the term with its definition or description.       -       A....
Please match off the term with its definition or description.       -       A.       B.       C.       D.    Face value of a bond, Principal Value       -       A.       B.       C.       D.    The expected return of a bond investor       -       A.       B.       C.       D.    The contractual rate of interest due to be...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT