Name: 
 

Chapter 30 Living Online



True/False
Indicate whether the statement is true or false.
 

 1. 

Using a notebook computer introduces risks not associated with desktop computers.
 

 2. 

Eavesdropping software can be downloaded free from the Internet and used by a hacker to access an unsecured wireless connection.
 

 3. 

A software firewall is more secure and easier to monitor than a hardware firewall.
 

 4. 

Data that has been saved cannot be lost or corrupted by equipment failure, software viruses or hackers, fire or flood, or power irregularities.
 

 5. 

Some spyware disguises itself as antispyware to gain access to your system.
 

 6. 

Firewalls help prevent employees from tampering with or deleting data.
 

 7. 

If you work for a company that provides e-mail services, the information that you send is your property.
 

 8. 

Before providing personal information or credit card information on an e-commerce site, first verify that the site is secure.
 

 9. 

It is the responsibility of a company or individual to protect their data.
 

 10. 

Old computer hardware such as monitors can create an environmental hazard if disposed of improperly.
 

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 11. 

What action might obstruct the air vents in your notebook computer and cause it to overheat?
a.
Leaving it in the same position on the desk for too long
b.
Using a cooling pad
c.
Setting it directly on your lap
d.
Plugging it into a grounded outlet
 

 12. 

What can result from making too many of the same motions over a long period of time?
a.
Browser hijacking
c.
Repetitive strain injury
b.
Brute force attacks
d.
Relaxed eye muscles
 

 13. 

It is estimated that ____ causes millions of dollars of damage each year, along with the theft of important and valuable data.
a.
hacking
c.
spying
b.
encryption
d.
eavesdropping
 

 14. 

One easy way to avoid data loss is to ____.
a.
plug the computer into a grounded outlet
c.
install a firewall
b.
save frequently
d.
turn on some form of encryption
 

 15. 

Surge protectors help protect computers from ____.
a.
hackers
c.
power spikes
b.
sniffers
d.
hard disk crashes
 

 16. 

External hard drives can be used to help ____.
a.
prevent computer hacking
c.
safeguard against software threats
b.
avoid data loss
d.
protect your system against spyware
 

 17. 

Often, you can inadvertently run a virus program by ____.
a.
installing a security update
c.
opening an e-mail message or attachment
b.
backing up data
d.
using a surge protector
 

 18. 

What is another term for brute force attacks?
a.
Browser hijacking
c.
Keylogger attacks
b.
Spyware attacks
d.
Dictionary attacks
 

 19. 

The goal of ____ is to collect information about the user, the user’s browsing habits, and other personal information.
a.
a sniffer
c.
a virus
b.
worms
d.
spyware
 

 20. 

Any information stored on a computer in an educational facility is the property of the ____.
a.
person using the computer
c.
person who created the information
b.
school
d.
none of the above
 

 21. 

TSL and SSL technology enables ____.
a.
data to be backed up securely
b.
companies to monitor unauthorized computer activity
c.
system administrators to restrict access to files
d.
sensitive information to be encrypted
 

 22. 

To make sure your e-commerce transactions are secure and to protect your private information, you should ____.
a.
use a secure browser
c.
keep personal information private
b.
check privacy policies
d.
all of the above
 

 23. 

When is it possible for the information that you submit on the Internet to be gathered by many persons and used for various situations?
a.
When you use a secure site
c.
When the data is encrypted
b.
Only if you don’t have a firewall
d.
Any time
 

 24. 

Which of the following is not true about spyware?
a.
It tracks your Web habits
b.
It can take over control of your computer
c.
It has redeeming qualities
d.
It can direct you to Web sites you have not chosen to visit
 

 25. 

When you use a computer in a public place, you should ____.
a.
verify that you have logged off
c.
use cookies to track your computer use
b.
install antivirus software
d.
use a code name
 

 26. 

If non-copyrighted information is published on a Web site, ____.
a.
it is true
c.
it is false
b.
it cannot be copied and used as your own
d.
the author is relieved of any responsibility
 

 27. 

What should you do before donating a computer?
a.
Remove the antivirus software
c.
Delete data from the hard drive
b.
Password-protect the operating system
d.
Turn off any encryption technologies
 

 28. 

Which of the following would be considered the strongest password?
a.
JeR3My
c.
SouTHWeST!
b.
tHund3r$t0rM
d.
#1fusion
 
 
FIGURE 30-1
nar001-1.jpg
 

 29. 

The message in Figure 30-1 above shows an example of ____.
a.
hacking
c.
sniffing
b.
phishing
d.
browser hijacking
 
 
FIGURE 30-2
nar002-1.jpg
 

 30. 

You could use the program shown in Figure 30-2 above to ____.
a.
protect your system against spyware
c.
configure a hardware firewall
b.
back up files
d.
password protect your wireless network
 
 
Case 30-1
Nelson is a graphic designer who works long hours on his computer. He tries to take precautions to avoid chronic physical maladies such as eyestrain, back problems, and repetitive strain injuries.
 

 31. 

What kind of furniture should Nelson use to help adapt his equipment and his workplace to fit himself?
a.
Expensive
c.
Ergonomic
b.
Light-weight
d.
Soft
 

 32. 

What can Nelson do to help avoid or minimize eyestrain?
a.
Use a low-resolution monitor to increase visibility
b.
Stay in the same position so his eyes become more comfortable
c.
Avoid using extra lighting so the monitor is more easily visible
d.
Take regular breaks to allow the eye muscles to relax
 
 
Case 30-2
Molly has just purchased a router and is setting up a wireless network in her home office. She wants to secure it properly.
 

 33. 

What is the first step Molly should take when setting up her wireless network?
a.
Download eavesdropping software
c.
Turn off the default encryption
b.
Change the default password
d.
Configure a hardware firewall
 

 34. 

If Molly does not properly secure her wireless network connection, what could happen if her neighbor uses her broadband connection?
a.
Her Internet access could be slower
b.
She could be charged additional costs
c.
She could be held responsible for any illegal activity
d.
Any of the above
 

Matching
 
 
Identify the letter of the choice that best matches the phrase or definition.
a.
Backup and Restore Center window
b.
Occupational Safety and Health Administration site
c.
FBI site
d.
VeriSign site
e.
Federal Trade Commission site
 

 35. 

Where could you find resources for Internet safety?
 

 36. 

Where could you back up data?
 

 37. 

Where could you purchase an SSL certificate?
 

 38. 

Where would you find guidelines for using and purchasing computer equipment?
 

 39. 

Where could you find guidelines to make sure your e-commerce transactions are secure?
 



 
Check Your Work     Start Over