Martes, Agosto 9, 2011

QUIZ 9

Computer Security and Safety, Ethics, and Privacy

1. Define the term, computer security risks, and briefly describe the types
of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy,
unethical employee, cyberextortionist, and cyberterrorist.

Answer:
A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information or processing capability. Cybercrime is an online or Internet-based illegal act like :
    a.) Hacker is a person who breaks into computers and computer networks for profit, in protest, or because they are motivated by the challenge.
    b.)  Cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security. A cracker can be doing this for profit, maliciously, for some altruistic purpose or cause, or because the challenge is there. Some breaking-and-entering has been done ostensibly to point out weaknesses in a site's security system.
    c.) Script kiddies is a derogatory term used to describe those who use script or programs developed by others to attack computer systems and networks and deface websites and have their disposal a large number of effective, easily downloadable malicious programs capable of breaching computers and networks.Such programs have included remote denial-of-service and vulnerability scanner/injector and often software intended for legitimate security auditing.
    d.) Corporate spies
    e.) Unethical employee
    f.) Cyberextorionist
    g.) Cyberterrorists

2. Describe various types of Internet and network attacks (computer viruses,
worms, Trojan horses, rootkits, botnets, denial of service attacks, back
doors, and spoofing), and identify ways to safeguard against these attacks,
including firewalls, intrusion detection software, and honeypots.

Ansewr:
A computer virus affects the computer negatively by altering the way the computer works, Worm copies itself repeatedly, using up resources and possibly shutting down computer or network. Trojan horse is a malicious program that hides within or looks like a legitimate program and Rootkit is a program that hides in a computer and allows someone from a remote location to take full control. A denial service attack is an assualt which disrupts computer access to an Internet service such as the Web or-email. Back door is a program or set of instructions in a program that allow users to bypass security controls when accessing a computer resource while spoofing is a tachnique intruders use to make their networks or Internet transmission appear legitimate to a victim computer or network. There are ways to prevent the different kinds of virus in computers like firewall it is a security system consisting of hardware and or software that prevents unathorized intrusion, monitors transmissions to and from computer and informs you to attempted intrusion. intrusion detection software analyzes network traffic, assesses system vulnerabilities and identifies intrusions and suspicious behavior.

3. Discuss techniques to prevent unauthorized computer access and use

Answer:
Some ways to prevent anuathorized computer access and use by disabling the file, folder and printer sharing on internet connection. use a user name with unique combination of characters that identifies user and make a password this is a private combination of characters associated with the user name that allows access to computer resources. aside from that ypou can also use a biometric device this is to authenticates person's identity using personal characteristics like fingerprints, hand geometry, voice, signature and iris.

4. Identify safeguards against hardware theft and vandalism.

Answer:
Hardware theft  is act of stealing computer equipment and hardware vandalism is an act of defacing or destroying computer equipment to safeguard computer from hardware theft and vandalism must used cables to lock equipment, for notebooks computers use passwords, possessed objects and biometrics as security methods and also password can protect mobile devices.
5. Explain the ways software manufacturers protect against software piracy.

Answer:
Software theft is an act of stealing or illegally stealing software, copying software or intentionally erasing programs, software piracy is illegal duplication of copyrighted software and to protect the
manufacturer's software against piracy they should have a license agreement this is an agreement in which users have the right to use the software legally and single-user liscense agreement allows user to install software on one computer, make backup copy, and sell software after removing from computer. Another way is the product activation which allows user to input product identification number online by telephone and receive unique installation identification number.
6. Discuss how encryption works, and explain why it is necessary.

Answer:
Encryption is to safeguard against information theft, process of converting plaintext (readable data) into ciphertext (unreadable characters) it is necessary because it often uses more than one method the Encryption key (formula), to read the data, the recipient must decrypt, or decipher the data.

7. Discuss the types of devices available that protect computers from
system failure.

Answer:
System failure is a prolonged malfunction of computer cause by aging hardware, natural disasters, or electrical power disturbances to protect the system from the said failure devices are available to protect the computer like surge protector it protects computer and equipment from electrical power disturbances and also uninterruptible power supply (UPS) is urge protector that provides power during power loss.

8. Explain the options available for backing up computer resources.

Answer:
Backup is a duplicate of file, program or disk, there are three options available for backing up computer the full back up of all files in computer, selective back up select which files to back up and three generation back up it preseves three copies of important files. ,in case of system failure or corrupted files restore files by copying to original location.

9. Identify risks and safeguards associated with wireless communications.

10. Discuss ways to prevent health-related disorders and injuries due to
computer use.

Answer:
hanging on computers in long hours is not healthy to our body infact is directly affects our vision and other parts and also our social life some of these are coputer vision syndrom (CVS) this is the eye and vision problems, the
repetitive strain injury (RSI) or the carpal tunnel syndrom (CTS) the inflammation of nerve that connects forearm to palm and tendonitis the inflammation of tendon due to repeated motion and the third one is Computer addiction it is when computer consumes entire social life. but there are some ways to prevent this health-related disorders such as spreading fingers apart for several seconds while keeping wrists straight, gently push back fingers and then thumb, dangle arms loosely at side and then shake arms and hands. To ease eyestrain while working at the computer, you must have take an eyebreak every 10-15 minutes look into the distance and focus on an object for 20-30 seconds, roll your eyes in complete circle, close your eyes and rest them at least for one minute, blink your eyes every five seconds, place your display device about an arm's lenght away from your eyes with the top of the screen at eye level or below, use large fonts, if you wear glasses, ask your doctor about computer glasses and adjust the lighting.
11. Recognize issues related to information accuracy, intellectual property
rights, codes of conduct, and green computing.

Answer:
Intellectual property is the right to which creators are entitled for their work, Codes od conduct is a written guidelines that helps determine whether computer action is ethical and employers can distribute to their employess in order to them to have a guide.


12. Discuss issues surrounding information privacy, including electronic
profiles, cookies, spyware and adware, spam, phishing, privacy laws, social
engineering, employee monitoring, and content filtering.

Answer:
Information privacy is the right of individuals and companies to deny or restrict collection and use of information about them yet today,  it is difficult because data is stotred online, employee monitoring is using computers to observe employee computer use and it is legal for employers to use monitoring software programs.  Electronic profile is a data collected when you fill out form on Web and there are merchants sell your electronic profile, often times you can specify whether you want personal information distributed. Cookies are small text file on your computer that contains data about you, some Web sites sell or trade information stored in the cookies and set browser to accept cookies promt you to accept cookies, or disable cookies. Spyware is a program placed on computer without user's knowledge while adware is a program that displays online advertisement. Spam is unsolicited e-mail messages sent to many recipients. Phishing is scam in which perpetrator sends an official looking e-mail that attempts to obtain your personal and financial information.

Huwebes, Agosto 4, 2011

QUIZ 8


Quiz 8 - Database Management

1. Define the term, database, and explain how a database interacts with data
and information.

2. Describe file maintenance techniques (adding records, modifying records,
deleting records) and validation techniques.

3. Discuss the terms character, field, record, and file

4. Discuss the functions common to most database management systems:
data dictionary, file retrieval and maintenance, data security, and backup
and recovery.

5. Differentiate between a file processing approach and the database
approach.

6. Describe characteristics of relational, object-oriented, and
multidimensional databases.

7. Explain how to access Web databases.

8. Define the term, computer security risks, and briefly describe the types
of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy,
unethical employee, cyberextortionist, and cyberterrorist.

9. Identify database design guidelines and discuss the responsibilities of
database analysts and administrators.

10. Discuss techniques to prevent unauthorized computer access and use
ANSWER:
1. Database -  is a collection of data organized so you can access, retrieve, and use it. Data is a raw facts while Information is a data that is organized and meaningful. Computers process data into information including a photograph, is entered and stored on the hard disk and extracts the member data from disk and lastly the receipt is created and printed.


2. File maintenance techniques - is a procedure that keep data current and add, change and delete (A,C, D), add new record when you obtain new data, change record to correct inaccurate data and update old data, records are deleted when it is no longer needed and some programs remove record immediately others flag record.

3. Field is a combination of one or more characters the smallest unit of data user accesses field name uniquely identifies each field, field size defines the maximum number of characters a field can contain and data type specifies kind of data field contains. Record are group of related fields the key field or primary key uniquely ientifies each record. And data file is collection of related records stored on disk.

4. Data dictionary contains ata about each file in database and each field within those files. Data security provides means to ensure only uathorized users can access data and access priviledges define activities that specific user or group of users can perform thus priviledges are the read-only priviledge wherein user can view data but cannot change it and full-update priviledges in which users can viewed and change data. Backup is a copy of the entire database.

5. File processing approach each department or area within organization has own set of files and records in one file may not relate to records in any other file and may have strenght as to reduced data redundancy, improved data integrity, shared data, easier access and reduced development time and its weaknesses like data redundancy same fields stored in multiple files and isolated data that are stored in a separate files so it is difficult to access. While database processing is an approach in which many programs and users can share data in database and secures data so only authorized users can access a certain data.

6. The four popular data models are the following relational database stores data in tables that consist of row and columns, each row has primary key and each columns has unique name it also stores data relationships and uses specialized terinology, object-oriented stores data in objects, can store more types of data, access data faster and programmers can refuse objects, example stores images, audio and video clips, engineering, architectural , and scientific designs, stores also documents such as schedules, calendars, manuals, menus and reports, and contains links and other documents lastly link to e-form on Webpage, and lastly multidimensional database stores data in dimensions also called hypercube, allow users to anlyze any view of data and can consolidate data much faster than relational database.

7. To access Web database by simply by filling in a form on a Web page usually resides on a database server, a computer that stores and provides access to a database.

8.

9. Guidelines for developing for developing database first you have to determine the purpose of the database, design the tables, in designing the tables fint on paper and each table should contain data about one subject, design the records and fields for each tables and be sure every record has a unique primary key, use separate fields for logically distinct items, do not create fields for information that can be derived from entries in other fields, allow enough space for each field and set default values for frequently entered data, and lastly determine the relationships among the tables or filesDatabase analyst focuses on meaning and usage of data, decides proper placement of fields, defines relationships, and identifies users' access privileges while Database administrator create and maintains data dictionary, manages database security, monitors database performance, and checks backup and recovery procedures.

10. Guidelines for developing a database first you have etermine the purpose of the database, second design the tables by fint on paper and each table should contain data about one subject, third, design the records and fields for each table and be sure every record has a unique primary key, use separate fields for logically distinct items, do not create fileds for information that can be derived from entries in other fields, allow enough space for each field and set default values for frequently entered data and the fourth one is to determine the relationships among the tables or files.