Java Games: Flashcards, matching, concentration, and word search.

Living Online Textbook, Unit 2: Using the Internet, Lesson 7: The Risks of Computing

In this lesson you will look at some of the risked of being online and steps you may be able to take in order to prevent damage to yourself or to the computer.

AB
HackerSomeone who gets unauthorized access to your computer to steal information, destroy or change information, or use your workstation physically or online.
PasswordImportant technique to protect data
ErgonomicsStudies humans in workplace
Theft - Ways to Protect Your Data or ComputerPurchase systems to lock computers in specia; cabinets or use durabled cables to tie them to the desk. Video cameras surveillance is a very effective for areas with a large number of computers.
Damage - Ways to Protect Your Data or ComputerMake sure that the computers and monitors are placed on stable surfaces. Position all wiring so that people won't trip over it and pull the computer or monitor over.
Data Loss - Ways to Protect Your Data or ComputerCan occur through hackers, hardware failure, power spikes, accidental deletions, or disgruntled employees.
Backups - Ways to Protect Your Data or ComputerShould occur regularly and backup copies stored in another location.
Power - Ways to Protect Your Data or ComputerTwo kinds of problems: outages and surges. Having an uninterruptible power supply (UPS) can provide some protection against total data loss.
Some measures to ensure safe environment include:Avoid temporary computer setups
Ensure CPU positioned somewhere stable with ample space for air circulationSome measures to ensure a safe environment include:
Ensure monitors on stable furnitureSome measures to ensure a safe environment include:
Use power bar to connect computer to power outletSome measures to ensure a safe environment include:
Keeping cables neat and out of general traffic routeSome measures to ensure a safe environment include:
Wrist - Repeated stress here causes painful inflammation (carpal tunnel syndrome)Erogonomics (Studies humans in the workplace) areas of concern:
Elbow Joint - Repeated stress can arise in this area causing painful inflammation.Erogonomics (Studies humans in the workplace) areas of concern:
Sitting for extended periods on incorrect seatingErogonomics (Studies humans in the workplace) areas of concern:
Monitor and keyboard should be straight in front of you.An example of workstation erogonomics:
No glare or reflections on screen.An example of workstation erogonomics:
Place any documents in document holder next to monitor.An example of workstation erogonomics:
Work surface should be stable.An example of workstation erogonomics:
When seated, wrists should be straight and flat.An example of workstation erogonomics:
Top of monitor should be about 2-3″ above eyes.An example of workstation erogonomics:
Arms and elbows should be close to body.An example of workstation erogonomics:
Use good, adjustable ergonomic chair.An example of workstation erogonomics:
Feet should be flat on floor.An example of workstation erogonomics:
Remember to take regular breaks.An example of workstation erogonomics:
Viewing Distance - (Ways of preventing eye strain)Monitor at comfortable horizontal distance for viewing.
Screen Quality - (Ways of preventing eye strain)Good quality monitor to reduce eye strain.
Bifocal/Progressive Lens -(Ways of preventing eye strain)Should be able to see screen without tilting head back or craning neck forwards.
Proper Lighting - (Ways of preventing eye strainNatural light always better. Lighting should be above or behind you, facing onto monitor.
Rest - (Ways of preventing eye strain)When take break, look in distance.
Eye Checkup - (Ways of preventing eye strain)If experiencing eye strain, consult eye professional
If full-time user a notebook, should consider getting separate keyboard and mouse where predominantly workTrue
Notebooks are non-ergonomic as the screen and keyboardare attached.True
Notebooks may not seem heavy, but cannot cause strain if carried long distancesFalse
Does product design and manufacturer’s claims make senseWhen considering a ergonomic product consider the following:
Try out product for comfort over extended period timeWhen considering a ergonomic product consider the following:
What do ergonomic experts say about productWhen considering a ergonomic product consider the following:
Only one way virus can infect computer — you let it in!True
Virus programs are not able to move from computer to computer.False
New virus programs are being created every day.True
All viruses come externally Via disks, e-mail attachments, or downloading.True
A virus cannot cause damage on any type of system with dataFalse
Virus hoaxes cause network traffic problems through panic notices.True
Boot Sector - (Types of Viruses)Infects system when read from infected floppy disk set up as boot disk and then writes to master boot sector.
Program or File - (Types of Viruses)Part of file used to start program or action.
Macro - (Types of Viruses)File runs in specific program and attaches to default settings for program, infecting every new or opened file in this program.
Multipartile - (Types of Viruses)Works similar to boot or program virus except these generally infect both areas.
WormsVirus programs that duplicate or replicate themselves through some means
Trojan HorsesWritten to be “hidden” and appear harmless
Some other malicious viruses exist but not actually virusesTrue
Purchase anti-virus program and install.One way of using an Anti-Virus Program
scan computer for any viruses possibly resident on computer.One way of using an Anti-Virus Program
Subscribe to anti-virus program for notices of updates and patches. Be sure to run these updates and patches as well.One way of using an Anti-Virus Program
Schedule scan to occur every time you start computer.One way of using an Anti-Virus Program
When downloading from Internet, save file in designated folder for downloads. Then scan file before opening file.One way of using an Anti-Virus Program
If get lots of e-mail attachments, set up anti-virus program to scan messages as they arrive into Inbox.One way of using an Anti-Virus Program
See messages, prompts, or displays never saw beforeOne way of indentifying/maintaining a virus free system.
Computer runs slower or problems with programsOne way of indentifying/maintaining a virus free system.
Hear sounds or music not heard before and occur randomlyOne way of indentifying/maintaining a virus free system.
Names of disk, volumes, or files changedOne way of indentifying/maintaining a virus free system.
Have lot more or less files than beforeOne way of indentifying/maintaining a virus free system.
See lots of error messages indicating file is missingOne way of indentifying/maintaining a virus free system.
Get messages with attachments from people don’t knowOne way of indentifying/maintaining a virus free system.
Get messages with attachments from people you know with “RE:” or “FW”, and didn’t send them anythingOne way of indentifying/maintaining a virus free system.
Every time you start your computer, run SCANDISKWhat you should do if your are concerned your anti-virus program is not catching everything.
Determine if anything has changed on your computer, particularly the amount of Total and Available memoryWhat you should do if your are concerned your anti-virus program is not catching everything
When using floppy disk, zip disk, or CD into computer, use an anti-virus program to scan disk contents first.What you should do if your are concerned your anti-virus program is not catching everything
With e-mail attachments never open the attachment without first scanning it.What you should do if your are concerned your anti-virus program is not catching everything
Go to anti-virus program’s Web site and run online scan on computerWhat you should do if your are concerned your anti-virus program is not catching everything
Data can be lost as result of power problems, computer breakdown, theft or hackingTrue
Backup is when you save data on the same system.False
To protect data, all users do not need to log in using valid id and passwordFalse
Backup allows you to recover data if computer stolen, data corrupted or deleted, or if damage occurs to computer from any other means.True


Business and Information Technology, Marketing Education Teacher
Hermitage High School
VA

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities