Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Assessment Task

Activity No.1
DIRECTION: Identify terms by filling in the blanks with the correct answer.
1. SOFTWARE SECURITY provides barriers and other cyber-tools that protect programs, files,
and the information flow to and from a computer.
2. HARDWARE SECURITY protects the machine and peripheral hardware from theft and from
electronic intrusion and damage.
3. OCCUPATIONAL HEALTH AND SAFETY are a planned system of working to prevent
illness and injury where you work by recognizing and identifying hazards and risks.
4. COMPUTER VIRUS refers to a program which damages computer systems and/or destroys or
erases data files.
5. ANTIVIRUS SOFTWARE is a computer program that detects, prevents, and takes action to
disarm or remove malicious software programs, such as viruses and worms.
6. A WORM is also a destructive program that fills a computer system with self-replicating
information, clogging the system so that its operations are slowed down or stopped.
7. A TROJAN is a type of malware that is often disguised as legitimate software.
8. A MACRO VIRUS is a computer virus written in the same macro language that is used for
software applications, such as word processing programs.
9. SHAREWARE is software that is distributed free on a trial basis with the understanding that the
user may need or want to pay for it later.
10. COPYRIGHT refers to the legal right of the owner of intellectual property.

Activity No. 2
With the introduction of computers there is a lot of evil that was being spread through the internet
and people using it to cause damages to others. If you are new at some organization there are some
computer ethics you will be expected to follow. So how knowledgeable are you when it comes to
computer ethics? Take up the test below and get to find out! Encircle the letter of the best answer.
1. What is Computer Ethics?
a. An honest moral code that should be followed when on the PC
b. A computer program about trustworthiness
c. A computer that fits on or under a desk
d. A list of commandments in the Bible

2. Thou shalt not create ___ software or games.


a. Difficult
a. Copyrighted
b. Easy
c. Harmful
3. Thou shalt not copy ___ software or materials.
a. Public-domain
b. Copyrighted
c. Self-created
d. Self-published
4. Which of the following is NOT a rule listed in Computer Discovery's Ten Commandments
of Computer Ethics?
a. Thou shalt not use a computer to email.
b. Thou shalt not use or copy software for which you have not paid.
c. Thou shalt not use a computer to interfere with other people's computer work.
d. Thou shalt not use a computer to be nosy or snoop into other people's computer files.
e. Thou shalt not use a computer to steal.
5. Jeruz has walked away from a lab computer without logging off. Trish sits down and, still
logged in as Jules, sends inflammatory e-mail messages out to a number of students and posts
similar messages on the class newsgroup.
a. Thou shall not use a computer to harm other people
b. Thou shall not use other people's computer resources without authorization
c. Thou shall use a computer in ways that show consideration and respect.
d. Thou shall not use a computer to steal.
e. Thou shalt not use a computer to be nosy or snoop into other people's computer files.

6. Kurt Robin sends e-mail to the entire student body inviting them to a BYOB party at his
house while his parents are out of town. Lester receives a message from a system administrator
calling him in for a meeting with school officials. He objects because he feels that his e-mail is his
own private business.
a. Thou shall not use a computer to harm other people
b. Thou shall not use other people's computer resources without authorization
c. Thou shall use a computer in ways that show consideration and respect.
d. Thou shall not use a computer to steal.
e. Thou shalt think about the social consequences of the program you are writing or the
system you are designing.
7. A secretary on the campus of a tax-supported university has been requested to give her staff
password to her supervisor. The supervisor would like to check the secretary's e-mail when she is
not at work to see if departmental-related mail is coming in. The secretary is not comfortable giving
her password to her supervisor, but is afraid to say no.
a. Thou shall not use a computer to harm other people
b. Thou shall not use other people's computer resources without authorization
c. Thou shall use a computer in ways that show consideration and respect.
d. Thou shall not use a computer to steal.
e. Thou shalt think about the social consequences of the program you are writing or the system you
are designing.
8. Patricia figures out that when she is logged into the server, she can look at others'
directories, make copies of files, and deposit new files. The operating system was designed to allow
this functionality so that people could share their work. Mr. Krasinski objects when he observes
Marla poking around in another student's directory. But Marla responds by saying, "If the system
allows me to do it and there's no specific rule against it, what's the problem?"
a. Thou shall not use a computer to harm other people
b. Thou shall not use other people's computer resources without authorization
c. Thou shall use a computer in ways that show consideration and respect.
d. Thou shall not use a computer to steal.
e. Thou shalt not snoop around in other people’s files.

9. Tina's e-mail is being diverted and sent out to her entire class. The messages are quite
personal and Tina is very embarrassed. Is this a violation of any commandments?
a. True
b. False
10. Rhia and Marlon are students at San Antonio de Padua High School. They have designed a
Web page devoted to their favourite rock band using their personal disk space on the school's Web
server. They have posted song clips, lyrics, photographs of each band member, and articles they
have found in various Web news sources. However, school authorities have asked them to shut
down their site because of the obscene content of many of the lyrics. Sharon and Timothy object,
noting that their First Amendment (free speech) rights are being violated. Is this a violation of the
Ten Commandments?
a. True
b. False

Activity No. 3
Excluding from the discussion above. Give at least 10 Tips on Taking Care of Your Personal Computers
and explain.
1. Pick up a laptop case or a laptop book bag to carry around your computer. You can even
improvised your own out of a sleeping bag or pillow. Dropping your laptop a couple of times
could result in crashing it, and wiping out all your important documents.
2. Be good to your battery because laptop batteries will only last for a few years. So, try not to
leave your battery charging all the time. When the battery is done charging, unplug the power
cable, or remove the battery. You should also charge your battery fully before unplugging the
power cable, and also use the battery fully before recharging.
3. Use antivirus and a firewall it’s important to use an antivirus program that's updated. It can
protect any confidential information you may have on your computer to be secured.
4. Defragment your hard drive regularly to get your computer to run faster.
5. Always declutter and get rid of old files you don't need any more so that your computer run
faster.
6. Reformat your computer if your computer is wearing out and remember to backing up all your
files and reinstalling your operating system. It’s for your computer protection.
7. Be careful with eating food and drinks near your computer you won't believe how many
computers are ruined with accidents involving food and drinks because a simple spill could cause
a big problem.
8. Disable programs you don't use if your computer takes a long time to load, it's probably because
it's loading programs that are set to run on startup. Check out which programs you don't need to
run on startup by accessing System Configuration, and disable them.
9. Keep your computer cool avoid using your computer on soft surfaces (like your bed) because
that will prevent air from flowing through your computer. Try to find a cool and hard surface for
your computer to prevent overheating, and to encourage airflow.
10. Always clean your Computer. It's important to clean your computer to prevent dust from
decreasing airflow, which can make your computer overheat. And always remember to be very
gentle when cleaning your computer.

You might also like