30 likes | 153 Vues
This guide covers crucial aspects of computer theft prevention, including the protection of portable and desktop computers. It discusses surge suppressors, disaster recovery planning, and the significance of maintaining backup media. The document also highlights email filtering for managing contacts and the importance of privacy in data collection processes. Key concepts such as UPS for power outages, information privacy, and the implications of software piracy are explored, providing a comprehensive overview of computer security and data management practices.
E N D
Ch15QQ 1. Hardware theft includes the theft of portable computers as well as desktop computers. 2. A surge suppressor can be used to protect a computer against theft. 3. A good disaster-recovery plan includes information about where backup media is located. 4. Only data from online purchases end up in marketing databases. 5. An e-mail filter is used to keep track of the e-mail addresses of people you write frequently.
Ch15QQ __ 6. Which of the following allows your computer to be used when the power goes out? a. UPS b. encryption c. cable lock d. surge protector e. computer tracking software __ 7. Having control over how information about you is collected and used is referred to as: a. presence technology b. employee monitoring c. opting out d. privacy policy e. information privacy
Ch15QQ a. privacy policy b. software piracy c. backup d. throw-away e-mail address e. digital counterfeiting __ 8. Used to prevent spam. __ 9. Used to restore data when the original data is lost or damaged. __ 10.The unauthorized copying of a computer program.