ComputingEssentials2010Page1of3AnswerstoEnd-of-ChapterMaterialsChapter10AcrossNum.ClueAnswer3MalicioussoftwareMalware6Programthatrecordskeystrokesandactivities.Keystrokelogger7UsedtorecordvirtuallyeverythingdoneonacomputerSnoopware8ThosewhogainaccesstosystemsforthefunandchallengeHacker9IncludesthelocationsofsitesvisitedbyyourbrowserHistoryfileDownNum.ClueAnswer1ProgramsthatrecordinformationonWebsitevisitors.Cookie2Devicethatseparatesthecomputerfromthepowersource.Surgeprotector4Studyofhumanfactorsrelatedtothethingspeopleuse.Ergonomics5ThosewhogainaccesstosystemsformaliciouspurposesCrackerNumMultipleChoiceAnswersMatchingAnswers1AG2AH3DF4BA5AB6CC7DJ8CD9BI10DEComputingEssentials2010Page2of3OpenEndedQuestions:1.Discusstheimpactoflargedatabases,privatenetworks,theInternet,andtheWebonprivacy.Largeorganizationsareconstantlycompilinginformationaboutus.Everyday,dataisgatheredaboutusandstoredinlargedatabases.Avastindustryofdatagatherersknownasinformationresellersorinformationbrokersnowexiststhatcollectsandsellssuchpersonaldata.Usingpubliclyavailabledatabasesandinmanycasesnonpublicdatabases,informationresellerscreateelectronicprofilesorhighlydetailedandpersonalizeddescriptionsofindividuals.2.Discussthevariouskindsofcomputercriminals.Therearemanytypesofcomputercriminals.Employees:Thelargestcategoryofcomputercriminalsconsistsofthosewiththeeasiestaccesstocomputers.Outsideusers:Somesuppliersorclientsmayhaveaccesstoacompany’scomputersystem.Hackers:Peoplewhogainunauthorizedaccesstoacomputersystemforthefunandchallengeofit.Crackers:Peoplewhodothesamethingashackersbutformaliciouspurposes.Organizedcrime:Computersareusefulforkeepingtrackofstolengoodsorillegalgamblingdebts.Terrorists:Knowledgeableterroristgroupsandhostilegovernmentscouldpotentiallycrashsatellitesandwageeconomicwarfarebydisruptingnavigationandcommunicationsystems.3.Whataretheprincipalmeasuresusedtoprotectcomputersecurity?Whatisencryption?Howisitusedbycorporationsandindividuals?Someoftheprincipalmeasurestoprotectcomputersecurityareencryption,restrictingaccess,anticipatingdisasters,andbackingupdata.Encryptionisencodingdatasothatitcannotbereadwithoutakey.Businesseshavebecomesogoodatitthatsomelawenforcementagenciesareunabletowiretapmessagesfromsuspectedcriminals.Individualsalsoareusingencryptionprogramstosafeguardtheirprivatecommunications.4.Whatisergonomics?Howdoescomputeruseimpactmentalhealth?Physicalhealth?Ergonomicsisdefinedasthestudyofhumanfactorsrelatedtothingspeopleuse.Sittinginfrontofascreeninawkwardpositionsforlongperiodsmayleadtophysicalproblemssuchaseyestrain,headaches,andbackpain.Computingcanbequitenoisy.Voiceinputandoutputcanbedistractingforco-worker.Researchshowsthatworkerswhoseperformanceismonitoredelectronicallysuffermorehealthproblemsthandothosewatchedbyhumansupervisors.Technostressisthetensionthatariseswhenwehavetoadaptunnaturallytocomputersratherthanhavingcomputersadapttous.5.DescribethebasicelementsoftheGreenPCandwhatyoucandotoprotecttheenvironment.ThebasicelementsoftheGreenPCare:•Systemunit:(1)usesanenergy-savingmicroprocessorthatrequiresaminimalamountofpower,(2)employsmicroprocessorandhard-diskdrivesthatshifttoanenergy-savingComputingEssentials2010Page3of3orsleepmodewhennotinoperation,(3)replacestheconventionalpowersupplyunitwithanadapterthatrequireslesselectricity,and(4)eliminatesthecoolingfan.•Display:(1)flatpanelsthatrequirelessenergythanthetraditionalmonitors,(2)specialpower-downmonitorsthatautomaticallyreducepowerconsumptionwhennotinuse,and(3)screen-saversoftwarethatclearsthedisplaywheneveritisnotinuse.•Manufacturing:ComputermanufacturerssuchasIntel,Apple,Compaq,andothersareusingfewerharmfulchemicalsinproduction.Particularattentionisgiventochlorofluorocarbons(CFCs)insolventsandcleaningagents.Toxicnickelandotherheavymetalsarebeingeliminatedorreducedinthemanufacturingprocesses.Answerstoprotectingtheenvironmentwillvary.