计算机专业英语影印版(Computing-Essentials-2008)课后答案大全—第十单元Ch

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

ComputingEssentials2010Page1of3AnswerstoEnd-of-ChapterMaterialsChapter10AcrossNum.ClueAnswer3MalicioussoftwareMalware6Programthatrecordskeystrokesandactivities.Keystrokelogger7UsedtorecordvirtuallyeverythingdoneonacomputerSnoopware8ThosewhogainaccesstosystemsforthefunandchallengeHacker9IncludesthelocationsofsitesvisitedbyyourbrowserHistoryfileDownNum.ClueAnswer1ProgramsthatrecordinformationonWebsitevisitors.Cookie2Devicethatseparatesthecomputerfromthepowersource.Surgeprotector4Studyofhumanfactorsrelatedtothethingspeopleuse.Ergonomics5ThosewhogainaccesstosystemsformaliciouspurposesCrackerNumMultipleChoiceAnswersMatchingAnswers1AG2AH3DF4BA5AB6CC7DJ8CD9BI10DEComputingEssentials2010Page2of3OpenEndedQuestions:1.Discusstheimpactoflargedatabases,privatenetworks,theInternet,andtheWebonprivacy.Largeorganizationsareconstantlycompilinginformationaboutus.Everyday,dataisgatheredaboutusandstoredinlargedatabases.Avastindustryofdatagatherersknownasinformationresellersorinformationbrokersnowexiststhatcollectsandsellssuchpersonaldata.Usingpubliclyavailabledatabasesandinmanycasesnonpublicdatabases,informationresellerscreateelectronicprofilesorhighlydetailedandpersonalizeddescriptionsofindividuals.2.Discussthevariouskindsofcomputercriminals.Therearemanytypesofcomputercriminals.Employees:Thelargestcategoryofcomputercriminalsconsistsofthosewiththeeasiestaccesstocomputers.Outsideusers:Somesuppliersorclientsmayhaveaccesstoacompany’scomputersystem.Hackers:Peoplewhogainunauthorizedaccesstoacomputersystemforthefunandchallengeofit.Crackers:Peoplewhodothesamethingashackersbutformaliciouspurposes.Organizedcrime:Computersareusefulforkeepingtrackofstolengoodsorillegalgamblingdebts.Terrorists:Knowledgeableterroristgroupsandhostilegovernmentscouldpotentiallycrashsatellitesandwageeconomicwarfarebydisruptingnavigationandcommunicationsystems.3.Whataretheprincipalmeasuresusedtoprotectcomputersecurity?Whatisencryption?Howisitusedbycorporationsandindividuals?Someoftheprincipalmeasurestoprotectcomputersecurityareencryption,restrictingaccess,anticipatingdisasters,andbackingupdata.Encryptionisencodingdatasothatitcannotbereadwithoutakey.Businesseshavebecomesogoodatitthatsomelawenforcementagenciesareunabletowiretapmessagesfromsuspectedcriminals.Individualsalsoareusingencryptionprogramstosafeguardtheirprivatecommunications.4.Whatisergonomics?Howdoescomputeruseimpactmentalhealth?Physicalhealth?Ergonomicsisdefinedasthestudyofhumanfactorsrelatedtothingspeopleuse.Sittinginfrontofascreeninawkwardpositionsforlongperiodsmayleadtophysicalproblemssuchaseyestrain,headaches,andbackpain.Computingcanbequitenoisy.Voiceinputandoutputcanbedistractingforco-worker.Researchshowsthatworkerswhoseperformanceismonitoredelectronicallysuffermorehealthproblemsthandothosewatchedbyhumansupervisors.Technostressisthetensionthatariseswhenwehavetoadaptunnaturallytocomputersratherthanhavingcomputersadapttous.5.DescribethebasicelementsoftheGreenPCandwhatyoucandotoprotecttheenvironment.ThebasicelementsoftheGreenPCare:•Systemunit:(1)usesanenergy-savingmicroprocessorthatrequiresaminimalamountofpower,(2)employsmicroprocessorandhard-diskdrivesthatshifttoanenergy-savingComputingEssentials2010Page3of3orsleepmodewhennotinoperation,(3)replacestheconventionalpowersupplyunitwithanadapterthatrequireslesselectricity,and(4)eliminatesthecoolingfan.•Display:(1)flatpanelsthatrequirelessenergythanthetraditionalmonitors,(2)specialpower-downmonitorsthatautomaticallyreducepowerconsumptionwhennotinuse,and(3)screen-saversoftwarethatclearsthedisplaywheneveritisnotinuse.•Manufacturing:ComputermanufacturerssuchasIntel,Apple,Compaq,andothersareusingfewerharmfulchemicalsinproduction.Particularattentionisgiventochlorofluorocarbons(CFCs)insolventsandcleaningagents.Toxicnickelandotherheavymetalsarebeingeliminatedorreducedinthemanufacturingprocesses.Answerstoprotectingtheenvironmentwillvary.

1 / 3
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功