unit 3 milestone 3 - intro to info tech.pdf - 1 Select the...

This preview shows page 1 - 4 out of 10 pages.

1 Select the sign of computer addiction that indicates neglect. When confronted by his parents about the excessive amount of time he spent playing video games, Tom claims that he plays for only an hour every day. Fearing she would lose her place in the standings of an online game, Rachel declined to attend her cousin's wedding. When confronted by her employer about the amount of time she spent checking her social media account at work, Heidi claimed that she only checks it during her breaks, and at lunch. While waiting in the light-rail station, David became so absorbed in an online political post that he missed his train and was late for work. RATIONALE Rachel declined to attend her cousin's wedding in order to keep playing an online game. This is clear evidence of neglect. CONCEPT Computer Addiction 2 Ben borrowed his friend's flash drive to save some files. Later, when he inserted the flash drive into his computer, everything he typed, and the address of every website he visited, was recorded and sent to a marketing company. What should Ben do to remove the offending program and prevent future attacks? Ben should install and run an antivirus program and change his network password. Ben should consider a different form of access control after installing and running an anti-spyware program. Ben should install and run an antivirus program, and should upgrade his system to WPA security. Ben should install and run antivirus and anti-spyware programs.
RATIONALE USB devices can contain malware and spread it to other devices without the user's knowledge. To protect against USB threats, make sure to check all USB devices with antivirus and anti-spyware programs before connecting them to the network. CONCEPT Network Security 3 Select the true statement about network protocols. Using a protocol other than TCP/IP can result in data loss. Computers that are distributed across a large geographic area need a special protocol to resolve errors. Communication cannot take place unless the protocol is executed in the same way on all devices . One function of a protocol is to decompress data when it is delivered to the receiving computer. RATIONALE A protocol is a system of rules that enables two or more entities (computer devices) in a communications system to send and receive information. Communication cannot take place unless the protocol is executed in exactly the same way on all devices. CONCEPT Introduction to Computer Networks 4 Select the true statement about COPPA. The COPPA regulations require that parents of children under the age of 13 be given instructions on how to maintain privacy.
The COPPA regulations apply to websites that collect information from children.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture