Answers to End-of-Chapter Materials

advertisement
Computing Essentials 2010
Answers to End-of-Chapter Materials
Chapter 10
Num
Multiple Choice
Answers
Matching
Answers
1
2
3
4
5
6
7
8
9
10
A
A
D
D
B
C
D
C
B
D
G
H
F
A
B
C
J
D
I
E
Open Ended Questions:
1. Discuss the impact of large databases, private networks, the Internet, and the Web
on privacy.
Large organizations are constantly compiling information about us. Every day, data is
gathered about us and stored in large databases. A vast industry of data gatherers known
as information resellers or information brokers now exists that collects and sells such
personal data. Using publicly available databases and in many cases nonpublic databases,
information resellers create electronic profiles or highly detailed and personalized
descriptions of individuals.
2. Discuss the various kinds of computer criminals.
There are many types of computer criminals.
Employees: The largest category of computer criminals consists of those with the easiest
access to computers.
Outside users: Some suppliers or clients may have access to a company’s computer
system. Hackers: People who gain unauthorized access to a computer system for the fun
and challenge of it.
Crackers: People who do the same thing as hackers but for malicious purposes.
Organized crime: Computers are useful for keeping track of stolen goods or illegal
gambling debts.
Terrorists: Knowledgeable terrorist groups and hostile governments could potentially
crash satellites and wage economic warfare by disrupting navigation and communication
systems.
3. What are the principal measures used to protect computer security? What is
encryption? How is it used by corporations and individuals?
Some of the principal measures to protect computer security are encryption, restricting
access, anticipating disasters, and backing up data. Encryption is encoding data so that it
cannot be read without a key. Businesses have become so good at it that some law
enforcement agencies are unable to wiretap messages from suspected criminals.
Page 1 of 2
Computing Essentials 2010
Individuals also are using encryption programs to safeguard their private
communications.
4. What is ergonomics? How does computer use impact mental health? Physical
health?
Ergonomics is defined as the study of human factors related to things people use. Sitting
in front of a screen in awkward positions for long periods may lead to physical problems
such as eyestrain, headaches, and back pain. Computing can be quite noisy. Voice input
and output can be distracting for co-worker. Research shows that workers whose
performance is monitored electronically suffer more health problems than do those
watched by human supervisors. Technostress is the tension that arises when we have to
adapt unnaturally to computers rather than having computers adapt to us.
5. Describe the basic elements of the Green PC and what you can do to protect the
environment.
The basic elements of the Green PC are:
• System unit: (1) uses an energy-saving microprocessor that requires a minimal amount
of power, (2) employs microprocessor and hard-disk drives that shift to an energy-saving
or sleep mode when not in operation, (3) replaces the conventional power supply unit
with an adapter that requires less electricity, and (4) eliminates the cooling fan.
• Display: (1) flat panels that require less energy than the traditional monitors, (2) special
power-down monitors that automatically reduce power consumption when not in use, and
(3) screen-saver software that clears the display whenever it is not in use.
• Manufacturing: Computer manufacturers such as Intel, Apple, Compaq, and others are
using fewer harmful chemicals in production. Particular attention is given to
chlorofluorocarbons (CFCs) in solvents and cleaning agents. Toxic nickel and other
heavy metals are being eliminated or reduced in the manufacturing processes.
Answers to protecting the environment will vary.
Page 2 of 2
Download