| A | B |
| Hacker | Someone who gets unauthorized access to your computer to steal information, destroy or change information, or use your workstation physically or online. |
| Password | Important technique to protect data |
| Ergonomics | Studies humans in workplace |
| Theft - Ways to Protect Your Data or Computer | Purchase systems to lock computers in specia; cabinets or use durabled cables to tie them to the desk. Video cameras surveillance is a very effective for areas with a large number of computers. |
| Damage - Ways to Protect Your Data or Computer | Make sure that the computers and monitors are placed on stable surfaces. Position all wiring so that people won't trip over it and pull the computer or monitor over. |
| Data Loss - Ways to Protect Your Data or Computer | Can occur through hackers, hardware failure, power spikes, accidental deletions, or disgruntled employees. |
| Backups - Ways to Protect Your Data or Computer | Should occur regularly and backup copies stored in another location. |
| Power - Ways to Protect Your Data or Computer | Two kinds of problems: outages and surges. Having an uninterruptible power supply (UPS) can provide some protection against total data loss. |
| Some measures to ensure safe environment include: | Avoid temporary computer setups |
| Ensure CPU positioned somewhere stable with ample space for air circulation | Some measures to ensure a safe environment include: |
| Ensure monitors on stable furniture | Some measures to ensure a safe environment include: |
| Use power bar to connect computer to power outlet | Some measures to ensure a safe environment include: |
| Keeping cables neat and out of general traffic route | Some measures to ensure a safe environment include: |
| Wrist - Repeated stress here causes painful inflammation (carpal tunnel syndrome) | Erogonomics (Studies humans in the workplace) areas of concern: |
| Elbow Joint - Repeated stress can arise in this area causing painful inflammation. | Erogonomics (Studies humans in the workplace) areas of concern: |
| Sitting for extended periods on incorrect seating | Erogonomics (Studies humans in the workplace) areas of concern: |
| Monitor and keyboard should be straight in front of you. | An example of workstation erogonomics: |
| No glare or reflections on screen. | An example of workstation erogonomics: |
| Place any documents in document holder next to monitor. | An example of workstation erogonomics: |
| Work surface should be stable. | An example of workstation erogonomics: |
| When seated, wrists should be straight and flat. | An example of workstation erogonomics: |
| Top of monitor should be about 2-3″ above eyes. | An example of workstation erogonomics: |
| Arms and elbows should be close to body. | An example of workstation erogonomics: |
| Use good, adjustable ergonomic chair. | An example of workstation erogonomics: |
| Feet should be flat on floor. | An example of workstation erogonomics: |
| Remember to take regular breaks. | An example of workstation erogonomics: |
| Viewing Distance - (Ways of preventing eye strain) | Monitor at comfortable horizontal distance for viewing. |
| Screen Quality - (Ways of preventing eye strain) | Good quality monitor to reduce eye strain. |
| Bifocal/Progressive Lens -(Ways of preventing eye strain) | Should be able to see screen without tilting head back or craning neck forwards. |
| Proper Lighting - (Ways of preventing eye strain | Natural light always better. Lighting should be above or behind you, facing onto monitor. |
| Rest - (Ways of preventing eye strain) | When take break, look in distance. |
| Eye Checkup - (Ways of preventing eye strain) | If experiencing eye strain, consult eye professional |
| If full-time user a notebook, should consider getting separate keyboard and mouse where predominantly work | True |
| Notebooks are non-ergonomic as the screen and keyboardare attached. | True |
| Notebooks may not seem heavy, but cannot cause strain if carried long distances | False |
| Does product design and manufacturer’s claims make sense | When considering a ergonomic product consider the following: |
| Try out product for comfort over extended period time | When considering a ergonomic product consider the following: |
| What do ergonomic experts say about product | When considering a ergonomic product consider the following: |
| Only one way virus can infect computer — you let it in! | True |
| Virus programs are not able to move from computer to computer. | False |
| New virus programs are being created every day. | True |
| All viruses come externally Via disks, e-mail attachments, or downloading. | True |
| A virus cannot cause damage on any type of system with data | False |
| Virus hoaxes cause network traffic problems through panic notices. | True |
| Boot Sector - (Types of Viruses) | Infects system when read from infected floppy disk set up as boot disk and then writes to master boot sector. |
| Program or File - (Types of Viruses) | Part of file used to start program or action. |
| Macro - (Types of Viruses) | File runs in specific program and attaches to default settings for program, infecting every new or opened file in this program. |
| Multipartile - (Types of Viruses) | Works similar to boot or program virus except these generally infect both areas. |
| Worms | Virus programs that duplicate or replicate themselves through some means |
| Trojan Horses | Written to be “hidden” and appear harmless |
| Some other malicious viruses exist but not actually viruses | True |
| Purchase anti-virus program and install. | One way of using an Anti-Virus Program |
| scan computer for any viruses possibly resident on computer. | One way of using an Anti-Virus Program |
| Subscribe to anti-virus program for notices of updates and patches. Be sure to run these updates and patches as well. | One way of using an Anti-Virus Program |
| Schedule scan to occur every time you start computer. | One way of using an Anti-Virus Program |
| When downloading from Internet, save file in designated folder for downloads. Then scan file before opening file. | One way of using an Anti-Virus Program |
| If get lots of e-mail attachments, set up anti-virus program to scan messages as they arrive into Inbox. | One way of using an Anti-Virus Program |
| See messages, prompts, or displays never saw before | One way of indentifying/maintaining a virus free system. |
| Computer runs slower or problems with programs | One way of indentifying/maintaining a virus free system. |
| Hear sounds or music not heard before and occur randomly | One way of indentifying/maintaining a virus free system. |
| Names of disk, volumes, or files changed | One way of indentifying/maintaining a virus free system. |
| Have lot more or less files than before | One way of indentifying/maintaining a virus free system. |
| See lots of error messages indicating file is missing | One way of indentifying/maintaining a virus free system. |
| Get messages with attachments from people don’t know | One way of indentifying/maintaining a virus free system. |
| Get messages with attachments from people you know with “RE:” or “FW”, and didn’t send them anything | One way of indentifying/maintaining a virus free system. |
| Every time you start your computer, run SCANDISK | What you should do if your are concerned your anti-virus program is not catching everything. |
| Determine if anything has changed on your computer, particularly the amount of Total and Available memory | What you should do if your are concerned your anti-virus program is not catching everything |
| When using floppy disk, zip disk, or CD into computer, use an anti-virus program to scan disk contents first. | What you should do if your are concerned your anti-virus program is not catching everything |
| With e-mail attachments never open the attachment without first scanning it. | What you should do if your are concerned your anti-virus program is not catching everything |
| Go to anti-virus program’s Web site and run online scan on computer | What you should do if your are concerned your anti-virus program is not catching everything |
| Data can be lost as result of power problems, computer breakdown, theft or hacking | True |
| Backup is when you save data on the same system. | False |
| To protect data, all users do not need to log in using valid id and password | False |
| Backup allows you to recover data if computer stolen, data corrupted or deleted, or if damage occurs to computer from any other means. | True |