1.
Avoiding Computeing Pitfalls Handout
2.
What term means a file left on hard drive by a Web site that the user visits?
Correct Answer
A. Cookie
Explanation
A cookie is a small file that is stored on a user's hard drive by a website they visit. It contains information about the user's browsing activity on that site, such as preferences and login information. Cookies are used to enhance the user experience and provide personalized content. They can also be used for tracking and advertising purposes.
3.
What term means a unique identfication number that is created by a piece of computer hardware or program?
Correct Answer
C. Global unique identifier
Explanation
A global unique identifier is a term that refers to a unique identification number generated by a computer hardware or program. This identifier is used to uniquely identify a particular entity or object within a system. It helps in ensuring that each entity has a distinct identification, avoiding any confusion or duplication.
4.
What term means when someone pretends that another person's work is his or her own?
Correct Answer
B. Infringement
Explanation
Infringement refers to the act of pretending that another person's work is one's own. It involves using someone else's ideas, words, or creations without giving them proper credit or permission. This can include plagiarism, copyright violation, or intellectual property theft. Infringement is a serious offense and is considered unethical in academic, professional, and creative fields.
5.
What term means to use a computer program to try and figure out a computer's password by trying different passwords until one works?
Correct Answer
A. Scanning
Explanation
The term "scanning" refers to the act of using a computer program to attempt to guess a computer's password by systematically trying different passwords until one is successful. This process is often used by hackers or individuals attempting unauthorized access to a system.
6.
What computer program will allow a user to access a computer network by skipping security measures?
Correct Answer
D. Supperzapper
Explanation
The term "supperzapper" does not refer to any legitimate computer program. Instead, it suggests a program that allows a user to bypass security measures, which is a violation of ethical and legal standards. Such programs are often used for malicious purposes, such as hacking or unauthorized access to computer networks. Therefore, the correct answer is "supperzapper" as it represents a program that enables users to access a computer network by circumventing security measures.
7.
What is a program set to cause damage at a particular time called?
Correct Answer
C. Time bomb
Explanation
A program set to cause damage at a particular time is commonly referred to as a "time bomb." This term is often used to describe malicious software that is programmed to execute a destructive action, such as deleting files or corrupting data, at a specific date or time. The name "time bomb" is fitting because the program is essentially ticking away until it reaches its predetermined trigger point, at which point it unleashes its damaging payload.
8.
Which term means a secret way for a person to access a computer?
Correct Answer
B. Trap door
Explanation
A trap door is a term that refers to a secret way for a person to access a computer. It is a hidden entry point that allows unauthorized access to a system or software. This term is commonly used in the context of computer security, where it represents a vulnerability that can be exploited by hackers or malicious individuals to gain unauthorized access to a computer system.
9.
What term means to steal some of a computer's memory chips?
Correct Answer
A. Memory shave
Explanation
The term "memory shave" refers to the act of stealing some of a computer's memory chips. This can be done by physically removing the chips from the computer or by using software to manipulate the memory allocation. This unauthorized action can lead to a decrease in the computer's performance and can potentially compromise the data stored in the affected memory chips.
10.
What term means to duplicate or copy all the files on a hard drive?
Correct Answer
D. Full backup
Explanation
A full backup refers to the process of duplicating or copying all the files on a hard drive. This includes all the data, applications, and settings stored on the drive. Performing a full backup ensures that all the information on the hard drive is replicated and can be restored in case of data loss or system failure. It provides a comprehensive and complete copy of the entire hard drive, offering a reliable and efficient method for data protection and recovery.
11.
What term means to copy only data files that have changed recently?
Correct Answer
A. Incremental backup
Explanation
An incremental backup is a type of backup that copies only the data files that have been modified or created since the last backup. This method helps to save time and storage space by only backing up the changes made to the files, rather than duplicating the entire data set. By regularly performing incremental backups, users can ensure that their data is protected and easily recoverable in case of any data loss or system failure.
12.
What is stolen in copyright infringement?
Correct Answer
D. Someone's work
Explanation
Copyright infringement refers to the unauthorized use, reproduction, or distribution of someone's work without their permission. This can include various forms of creative expression such as music, movies, books, artwork, and software. When someone's work is stolen through copyright infringement, it means that their intellectual property rights are violated, and they may suffer financial losses or damage to their reputation. It is important to respect and protect the rights of creators by obtaining proper permissions or licenses before using or sharing their work.
13.
What approach can be used to block scanning on a computer network?
Correct Answer
A. Limit the number of logon attempts permitted
Explanation
Limiting the number of logon attempts permitted can be an effective approach to block scanning on a computer network. By setting a limit on the number of login attempts, it prevents malicious actors from using automated tools to continuously guess passwords and gain unauthorized access to the network. This measure helps to enhance the security of the network by reducing the risk of brute force attacks and unauthorized access attempts.
14.
Which of the following cybercrimes is a consequence of a computer system that has been hacked into?
Correct Answer
C. Vandalism
Explanation
Vandalism is a cybercrime that occurs as a result of hacking into a computer system. When a computer system is hacked, unauthorized individuals gain access and can intentionally damage or destroy data, software, or hardware. This act of malicious destruction or defacement is considered vandalism in the cyber world.
15.
Why is copyright infringement a crime?
Correct Answer
D. It is theft of another person's work
Explanation
Copyright infringement is considered a crime because it involves the unauthorized use, reproduction, or distribution of someone else's original work without their permission. This act is equivalent to stealing because it deprives the original creator of their rights and the potential economic benefits that come with it. By using someone else's work without proper authorization, individuals are essentially taking credit for someone else's efforts and violating their intellectual property rights. Therefore, copyright infringement is seen as a crime to protect the rights and creativity of content creators.
16.
Which group aims to protect the U.S.A. from terrorist attacks on computer networks?
Correct Answer
D. National Infrastructure Protection Center (NIPC)
Explanation
The National Infrastructure Protection Center (NIPC) aims to protect the U.S.A. from terrorist attacks on computer networks.
17.
Which of the following is a way to protect your password?
Correct Answer
C. Use numbers and letters
Explanation
Using numbers and letters in a password is a way to protect it because it increases the complexity and makes it harder for hackers to guess or crack. Including a combination of both uppercase and lowercase letters, as well as numbers, adds an extra layer of security by making the password more unpredictable. This reduces the risk of unauthorized access to personal accounts or sensitive information.
18.
The Internet has made it more difficult to invade a person's privacy.
Correct Answer
B. False
Explanation
The statement is false because the Internet has actually made it easier to invade a person's privacy. With the vast amount of personal information available online, such as social media profiles, online shopping habits, and search history, it has become easier for individuals, companies, and even governments to collect and exploit this data for various purposes. Additionally, cybercrime and hacking have become more prevalent, leading to unauthorized access to personal information and further compromising privacy.
19.
Check two items that have endangered our privacy while surfing the net.
Correct Answer(s)
A. Cookies
B. GUIDs
Explanation
Cookies and GUIDs are two items that have endangered our privacy while surfing the net. Cookies are small files that websites store on our computers to track our browsing behavior and preferences. They can be used by advertisers to target us with personalized ads and can also be accessed by unauthorized parties, compromising our privacy. GUIDs (Globally Unique Identifiers) are unique identifiers assigned to devices or users. They can be used to track our online activities across different websites, allowing companies to create detailed profiles about us without our knowledge or consent. Both cookies and GUIDs pose significant threats to our online privacy.