Chapter 11 Solution

Discovering Computer 2011 – Living in a Digital World
Page 597-598
Lecturer : Tri Djoko Wahjono


  1. Not all breaches to computer security are planned. (False)
  2. The term, cyberwarfare, describes an attack whose goal ranges from disabling a government’s computer network to crippling a country. (True)
  3. Many methods exist to guarantee completely a computer or network is safe from computer viruses and other malware. (False)
  4. Cybercriminals install malicious bots on unprotected computers to create a zombie army. (True)
  5. A honeypot is a computer that is isolated and, therefore, immune to attack. (False)
  6. Biometric payment involves a customer’s fingerprint being read by a fingerprint reader that is linked to a payment method such as a checking account or credit card. (True)
  7. Some businesses use a real time location system (RTLS) to track and identify the location of high-risk or high-value items. (True)
  8. A program called a keygen, short for key generator, creates software registration numbers and sometimes activation codes. (True)
  9. With public key encryption, both the originator and the recipient use the same secret key to encrypt and decrypt the data. (False)
  10. A digitial signature is a mathematical formula that generates a code from the contents of the message. (False)
  11. Digital rights management (DRM) is a strategy designed to prevent illegal distribution of movies, music, and other digital content. (True)
  12. Green computing involves reducing the electricity while using a computer, but the practice increases environmental waste. (False)

Multiple Choice

  1. B. Rootkit
  2. D. Worms, rootkits, back doors
  3. A. Denial of service attack
  4. C. Digital forensics
  5. C. Hardware theft
  6. D. Encryption key
  7. D. Power usage effectiveness (PUE)
  8. C. Social engineering


  1. Virus, j. potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission
  2. Trusted source, d. organization or person you believe will not send a virus infected file knowingly
  3. Quarantine, e. area of the hard disk that holds an infected file until the infection can be removed
  4. Botnet, g. group of compromised computers connected to a network such as the Internet that is being used as part of a network that attacks other networks, usually for nefarious purposes
  5. Spoofing, i. technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network
  6. Personal firewall, c. protects a personal computer and its data from unauthorized intrusions
  7. Passphrase, b. private combination of words, often containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources
  8. Encryption algorithm, a. set of steps that can convert readable plaintext into unreadable ciphertext
  9. Biometric device, h. translates a personal characteristic into digital code
  10. Surge protector, f. uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching the computer and other electronic equipment

Short Answer

  1. How do antivirus programs detect and identify a virus?
    There are two ways that an antivirus programs detect and identify a virus.
    First, it scans/monitors the programs by its code, if it found a program code that matches with the virus code in its signature database, it will consider that program a virus. Secondly, it scans/monitors the programs by analyzing its behavior, such as modification of critical system files/important data files, if any behavior seems suspicious, then the antivirus program will alert the user that there are suspicious behavior, or it may alert the user that malicious actions are about to be performed, and block that behavior.
    – What is a virus hoax?
    Virus hoax is an e-mail message that warns users of a nonexistent virus or other malware.
  2. Describe the ENERGY STAR program.
    The United States Department of Energy (DOE) and the United States Environmental Protection Agency (EPA) developed the ENERGY STAR program to help reduce the amount of electricity used by computers and related devices. This program encourages manufacturers to create energy- efficient devices that require little power when they are not in use. For example, many devices switch to sleep or power save mode after a specified number of inactive minutes or hours. Computers and devices that meet the ENERGY STAR guidelines display an ENERGY STAR label.
    – How should users handle obsolete computers?
    Users should not store obsolete computers and devices in their basement, storage room, attic, warehouse, or any other location. Computers, monitors, and other equipment contain toxic materials and potentially dangerous elements including lead, mercury, and flame retardants. In a landfill, these materials release into the environment. Recycling and refurbishing old equipment are much safer alternatives for the environment. Manufacturers can use the millions of pounds of recycled raw materials to make products such as outdoor furniture and automotive parts.
  3. What is information privacy?
    The right of individuals and companies to deny or restrict the collection and use of information about them.
    List five ways to safeguard your personal information.
    Five ways to safeguard your personal information :
    * Do not reply to spam for any reason.
    * Limit the amount of information you provide to Web sites. Fill in only required information.
    * Purchase goods with cash, rather than credit or checks.
    * Clear your history file when you are finished browsing.
    * Fill in only necessary information on rebate, warranty, and registration forms.
  4. What are two methods for avoiding phishing attacks?
    Install a phishing filter and never click a link in an e-mail message; instead, retype the Web address in your browser.
    – How does clickjacking work?
    With clickjacking, an object that can be clicked on a Web site, such as a button, image, or link, contains a malicious program. When a user clicks the disguised object, a variety of nefarious events may occur. For example, the user may be redirected to a phony Web site that requests personal information, or a virus may download to the computer.
  5. Who uses content filtering and why?
    Many businesses use content filtering to limit employees’ Web access. These businesses argue that employees are unproductive when visiting inappropriate or objectionable Web sites. Some schools, libraries, and parents use content filtering to restrict access to minors.
    – Describe a rating system used for content filtering.
    One approach to content filtering is through a rating system of the Internet Content Rating Association (ICRA), which is similar to those used for movies and videos. Major Web sites such as Yahoo!, AOL, and MSN use the rating system established by the ICRA. If content at the Web site goes beyond the rating limits set in the Web browser software, a user cannot access the Web site. Concerned parents can set the rating limits and prevent these limits from being changed by using a password.
This entry was posted in PTI. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s