1 / 3

Essential Insights on Computer Theft Prevention, Data Security, and Privacy Management

This guide covers crucial aspects of computer theft prevention, including the protection of portable and desktop computers. It discusses surge suppressors, disaster recovery planning, and the significance of maintaining backup media. The document also highlights email filtering for managing contacts and the importance of privacy in data collection processes. Key concepts such as UPS for power outages, information privacy, and the implications of software piracy are explored, providing a comprehensive overview of computer security and data management practices.

mead
Télécharger la présentation

Essential Insights on Computer Theft Prevention, Data Security, and Privacy Management

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Ch15QQ 1. Hardware theft includes the theft of portable computers as well as desktop computers. 2. A surge suppressor can be used to protect a computer against theft. 3. A good disaster-recovery plan includes information about where backup media is located. 4. Only data from online purchases end up in marketing databases. 5. An e-mail filter is used to keep track of the e-mail addresses of people you write frequently.

  2. Ch15QQ __ 6. Which of the following allows your computer to be used when the power goes out? a. UPS b. encryption c. cable lock d. surge protector e. computer tracking software __ 7. Having control over how information about you is collected and used is referred to as: a. presence technology b. employee monitoring c. opting out d. privacy policy e. information privacy

  3. Ch15QQ a. privacy policy b. software piracy c. backup d.  throw-away e-mail address e. digital counterfeiting __ 8.  Used to prevent spam. __ 9.  Used to restore data when the original data is lost or damaged. __ 10.The unauthorized copying of a computer program.

More Related