Computing Essentials 2010 Answers to End-of-Chapter Materials Chapter 10 Num Multiple Choice Answers Matching Answers 1 2 3 4 5 6 7 8 9 10 A A D D B C D C B D G H F A B C J D I E Open Ended Questions: 1. Discuss the impact of large databases, private networks, the Internet, and the Web on privacy. Large organizations are constantly compiling information about us. Every day, data is gathered about us and stored in large databases. A vast industry of data gatherers known as information resellers or information brokers now exists that collects and sells such personal data. Using publicly available databases and in many cases nonpublic databases, information resellers create electronic profiles or highly detailed and personalized descriptions of individuals. 2. Discuss the various kinds of computer criminals. There are many types of computer criminals. Employees: The largest category of computer criminals consists of those with the easiest access to computers. Outside users: Some suppliers or clients may have access to a company’s computer system. Hackers: People who gain unauthorized access to a computer system for the fun and challenge of it. Crackers: People who do the same thing as hackers but for malicious purposes. Organized crime: Computers are useful for keeping track of stolen goods or illegal gambling debts. Terrorists: Knowledgeable terrorist groups and hostile governments could potentially crash satellites and wage economic warfare by disrupting navigation and communication systems. 3. What are the principal measures used to protect computer security? What is encryption? How is it used by corporations and individuals? Some of the principal measures to protect computer security are encryption, restricting access, anticipating disasters, and backing up data. Encryption is encoding data so that it cannot be read without a key. Businesses have become so good at it that some law enforcement agencies are unable to wiretap messages from suspected criminals. Page 1 of 2 Computing Essentials 2010 Individuals also are using encryption programs to safeguard their private communications. 4. What is ergonomics? How does computer use impact mental health? Physical health? Ergonomics is defined as the study of human factors related to things people use. Sitting in front of a screen in awkward positions for long periods may lead to physical problems such as eyestrain, headaches, and back pain. Computing can be quite noisy. Voice input and output can be distracting for co-worker. Research shows that workers whose performance is monitored electronically suffer more health problems than do those watched by human supervisors. Technostress is the tension that arises when we have to adapt unnaturally to computers rather than having computers adapt to us. 5. Describe the basic elements of the Green PC and what you can do to protect the environment. The basic elements of the Green PC are: • System unit: (1) uses an energy-saving microprocessor that requires a minimal amount of power, (2) employs microprocessor and hard-disk drives that shift to an energy-saving or sleep mode when not in operation, (3) replaces the conventional power supply unit with an adapter that requires less electricity, and (4) eliminates the cooling fan. • Display: (1) flat panels that require less energy than the traditional monitors, (2) special power-down monitors that automatically reduce power consumption when not in use, and (3) screen-saver software that clears the display whenever it is not in use. • Manufacturing: Computer manufacturers such as Intel, Apple, Compaq, and others are using fewer harmful chemicals in production. Particular attention is given to chlorofluorocarbons (CFCs) in solvents and cleaning agents. Toxic nickel and other heavy metals are being eliminated or reduced in the manufacturing processes. Answers to protecting the environment will vary. Page 2 of 2