Security and Safety Flashcards

1
Q

Technology can lead to the following behavioural risks

A
  • Sedentary lifestyle. Often results to too little time for physical activities
  • Psychological development. Several psychological mental health concerns such as poor self-confidence, anxiety, depression, low and emotional stability and even lower life satisfaction
  • Social interaction. Often resist face-to-face interaction with others and this may hinder social skill development or even cause social withdrawal

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a malware

A

It is a malicious software that can delete or corrupt files and gather personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a computer virus

A

It is a malicious computer code that, reproduces itself on the same computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a worm (network virus)

A

It is a type of malware that attempts to spread. It uses computer networks to replicate and then takes advantage of a vulnerability on the host computer. Once the worm has exploited that vulnerability on the system it immediately searches for another computer on the network that is the same vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a computer trojan

A

It is a malware that hides inside another program, masking itself as performing a safe activity but is also malicious. When it is installed it scans the system for credit card numbers and passwords, connects through the network to a remote system and then transmit that information to the attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is it not safe to connect to public Wi-Fi networks

A

Because these networks are rarely protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a digital certificate

A

It’s a technology used to verify a user’s identity and key that has been signed by a trusted third party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentication

A

Is the process of ensuring that the person requesting access to a computer or other resources is authentic and not an imposter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a ransomware

A

Prevents a users device from properly and fully functioning until a fee is paid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Places you can recycle electronics include

A
  • Device manufacturers
  • Community recycling centers
  • Some hardware and electronics stores
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name the ergonomic guidelines to technology use

A
  • Proper physical alignment by using the right chair
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Computer vision syndrome

A

Dry eyes, headaches, blurred or double vision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is encryption

A

It encodes a file, folder or drive to effectively scramble the data so that unauthorised users cannot read it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is address spoofing

A

Makes an email address or IP address appear legitimate by masking it’s true destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An __ defines who can access a network or device, when they can access it, and by what actions they can take

A

Access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Biometric input

A

Uses a person’s unique physical characteristics or behaviour to verify their identity

17
Q

What is sideloading

A

Installing apps from somewhere other than your devices app store

18
Q

A plug in enables a browser to __

A

Play or display certain multimedia files