Download as pdf or txt
Download as pdf or txt
You are on page 1of 23

Technology Now Your Companion to

SAM Computer Concepts 1st Edition


Corinne Hoisington Solutions Manual
Go to download the full and correct content document:
https://testbankdeal.com/product/technology-now-your-companion-to-sam-computer-c
oncepts-1st-edition-corinne-hoisington-solutions-manual/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Technology Now Your Companion to SAM Computer Concepts


1st Edition Corinne Hoisington Test Bank

https://testbankdeal.com/product/technology-now-your-companion-
to-sam-computer-concepts-1st-edition-corinne-hoisington-test-
bank/

Technology Now Your Companion to SAM Computer Concepts


2nd Edition Corinne Hoisington Solutions Manual

https://testbankdeal.com/product/technology-now-your-companion-
to-sam-computer-concepts-2nd-edition-corinne-hoisington-
solutions-manual/

Technology Now Your Companion to SAM Computer Concepts


2nd Edition Corinne Hoisington Test Bank

https://testbankdeal.com/product/technology-now-your-companion-
to-sam-computer-concepts-2nd-edition-corinne-hoisington-test-
bank/

Introduction To Computer Security 1st Edition Goodrich


Solutions Manual

https://testbankdeal.com/product/introduction-to-computer-
security-1st-edition-goodrich-solutions-manual/
Enhanced Computer Concepts and Microsoft Office 2013
Illustrated 1st Edition Parsons Solutions Manual

https://testbankdeal.com/product/enhanced-computer-concepts-and-
microsoft-office-2013-illustrated-1st-edition-parsons-solutions-
manual/

Computer Concepts Illustrated Introductory 9th Edition


Parsons Solutions Manual

https://testbankdeal.com/product/computer-concepts-illustrated-
introductory-9th-edition-parsons-solutions-manual/

Computer Math Problem Solving For Information


Technology 2nd Edition Charles Solutions Manual

https://testbankdeal.com/product/computer-math-problem-solving-
for-information-technology-2nd-edition-charles-solutions-manual/

Illustrated Computer Concepts and Microsoft Office 365


and Office 2016 1st Edition Parsons Solutions Manual

https://testbankdeal.com/product/illustrated-computer-concepts-
and-microsoft-office-365-and-office-2016-1st-edition-parsons-
solutions-manual/

Psychology Majors Companion 1st Edition Dunn Test Bank

https://testbankdeal.com/product/psychology-majors-companion-1st-
edition-dunn-test-bank/
Technology Now End of Chapter Exercise Answers Page 1 of 16

Technology Now
Chapter 7: The Connected
Computer
Chapter Review
INTRODUCTION TO NETWORKS
1. What are the two main types of network architecture? Briefly describe each one.
Peer-to-peer and client/server. A peer-to-peer network is best suited for networks of 10 or fewer
computers, like those found in homes or small offices. Each computer maintains its own files and
software. All computers have the same capabilities and responsibilities, but share resources and
peripherals such as printers. In a client/server network, one central computer, called the server,
controls access to network resources.
2. What do you call a network that spans long distances? Give two examples of areas where such a
network would be appropriate.
A wide area network (WAN) covers a large geographic region. A WAN is appropriate for a state,
country, or other large area where data needs to be transmitted over long distances. Examples include
multinational company, governments, and national retail chain.
3. What type of network connects digital devices within about 30 feet of each other? Give one
example.
A personal area network (PAN) connects personal digital devices within a range of about 30 feet (9
meters). Bluetooth is the example in the chapter.
4. Give three examples of network standards, and state how each one might be used.
Network standards specify the way computers access a network, the type(s) of hardware used, data
transmission speeds, and the types of cable and wireless technology used. See Table 7-3 below for
examples.
Technology Now End of Chapter Exercise Answers Page 2 of 16

5. What piece of hardware lets your computer connect to networks?


To connect to a network, your computer might need a network interface card (NIC), which can be
wired or wireless.
6. What do you call a company that connects you to the Internet?
Once you have connected to your local network, you need a way to connect to the Internet, which you
do through an Internet service provider (ISP).

HOW NETWORKS WORK


7. What lets your laptop, tablet, or smartphone connect to the Internet in a coffee shop?
Wi-Fi hotspots let you connect your Wi-Fi-enabled laptop, tablet, or smartphone to the Internet in a
public space such as a coffee shop or library.
Technology Now End of Chapter Exercise Answers Page 3 of 16
8. What is a modem? Name three types of modems.
A modem is a communications device that connects a communications channel such as the Internet to
a sending or receiving device such as a computer. Examples include Cable modems, DSL modems,
Wireless modems.
9. Describe the purpose of a network protocol and give an example.
For network devices to communicate with each other, they must follow a common set of rules, or
protocols. TCP/IP is the protocol example in the chapter.

TYPES OF NETWORKS
10. Name three types of network topologies and briefly describe the layout of each one.
Network topologies include star, bus, ring, and mesh networks, as well as combination topologies.

11. Describe why one might need a combination topology, and give an example.
Technology Now End of Chapter Exercise Answers Page 4 of 16
Some networks combine topologies to connect smaller networks and form one larger network.
Examples include tree topology, full mesh topology and partial mesh topology.
12. How does a client/server network differ from a peer-to-peer network?
On a client/server network, one or more computers acts as a server, a computer on a network that
controls access to hardware, software, and other resources. The other computers on the network
request services from the server. Some servers provide centralized storage for programs, data, and
information. The clients are other computers and mobile devices on the network that rely on the
server for their resources.
Peer-to-peer (P2P) networks are networks of equals (peers), and typically have fewer than 10
computers. They are less expensive and easier to set up than client/server networks because they have
no dedicated servers (servers that only serve the network, and are not shared). P2P networks do not
use a central network server. Each peer maintains its own operating system, application software, and
data files. Peers can share files and peripheral devices such as printers with peers.

THE INTERNET
13. Name three services available over the Internet. How might you use each service in your daily
life? Which of the services do you use most often and why?
People use the Internet every day for tasks such as visiting Web sites to listen to music, do their
banking, and stay in touch with family and friends. Student answers will vary.
14. Describe three Internet services you can use to communicate with colleagues or friends. What
are the key benefits of each service? How are the three services different from each other?
VoIP, Email, Text messaging, Chatting, Multimedia messaging are possible services. Possible answers
include those listed in Table 7-6.
Technology Now End of Chapter Exercise Answers Page 5 of 16

THE NETWORKED WORLD


15. Why would you use the following types of communication? Give a brief example of a good use of
each: email, Web conference, VoIP, text messaging, chatting, and multimedia messaging.
Answers and examples will vary, however, three answers are in Figure 7-19.

16. Briefly define social networking. How might a recent college graduate use social networking after
taking a job 100 miles from her school? How might a family with grown children living 100 miles
apart might use social networking to keep in touch?
Social-networking Web sites have changed the way people interact, form and maintain relationships,
find jobs, promote careers, and communicate with each other. Through Facebook, Twitter, LinkedIn,
Google+, and other sites, people communicate by sharing ideas, photos, videos, and links to other Web
sites.
17. What is the difference between hackers and crackers? How do hackers and crackers gain
unauthorized access to a computer?
A hacker uses computers to access data without authorization, often illegally. Crackers use computers
to destroy data, steal information, and commit other malicious crimes.
If hackers gain unauthorized access to networked computers, they can take over the computers and
turn them into zombies, which are computers controlled by outsiders without the owners’ knowledge.
After creating a zombie, a hacker can install a bot, a program that performs a repetitive task such as
sending phishing email messages. The hacker can also group these zombies together to form a botnet,
which would send out massive amounts of phishing messages, for example.
18. What are the common forms of malware and how does it infect a computer?
Common forms of malware are shown below in Table 7-9 with a description of each.
Technology Now End of Chapter Exercise Answers Page 6 of 16

NETWORK SECURITY BASICS


19. What are three common-sense strategies for securing a home network?
Create strong passwords for your home network. Include at least eight characters, numbers, letters, or
symbols that are not easy to figure out.
Set permissions to determine who can access which resources. Limit access as much as you can.
Do not write usernames and passwords in places where they can be found by others.
Enable the highest level of encryption, such as WPA2 or WPA-TKIP, for a wireless router, and change
the router’s default administrator password.
20. How do encryption and firewalls protect network data?
Encryption scrambles or codes data as it is transmitted over a network. If intruders intercept a file in transit,
they cannot make sense of the data they find.

Firewalls are designed to block intruders from accessing corporate or personal networks. If you have an always-
on connection to the Internet, you can be vulnerable to intrusions. Personal firewalls constantly monitor all
network traffic to keep your network secure.

Test Your Knowledge Now


1. A circuit board with special electronic circuits that connects a computer to a network is called a:
a. router
b. hub
c. network interface card (NIC)
d. switch
2. A network architecture in which all computers are equal in capability and responsibility is called a:
a. peer-to-peer network
b. client/server network
c. wireless access point
d. wide area network
3. A company that offers Internet access to individuals and businesses is a(n):
a. network service provider
b. Internet backbone
c. Internet service provider
d. wide area network
Technology Now End of Chapter Exercise Answers Page 7 of 16
4. The most common networking standard for wired networks is:
a. Wi-Fi
b. Ethernet
c. Bluetooth
d. 4G
5. The hardware that sends and receives data and information to and from a digital line is a(n):
a. digital modem
b. network interface card
c. Internet service provider
d. Wi-Fi hotspot
6. Which network standard lets devices communicate wirelessly over short distances?
a. Ethernet
b. Bluetooth
c. Phoneline
d. 4G
7. Which of the following network types uses radio signals to connect computers and devices?
a. Wi-Fi
b. Ethernet
c. modem
d. DSL modem
8. RJ-11, RJ-45, and USB are all examples of:
a. connectors
b. cables
c. domain controllers
d. ports
9. What type of network has all devices attached in a line to a central cable:
a. ring
b. star
c. bus
d. mesh
10. A networked computer that controls access to hardware, software, and other network resources is called a:
a. client
b. server
c. router
d. modem
11. You click a(n) _____ to go from one Web page to another.
a. link
b. URL
c. window
d. app
12. You use ____ when your telephone calls travel over the Internet instead of using traditional phone systems.
a. cell towers
Technology Now End of Chapter Exercise Answers Page 8 of 16
b. VoIP
c. Wi-Fi
d. cloud computing
13. With _____ computing, you can access files and applications over the Internet.
a. cellular
b. VoIP
c. Wi-Fi
d. cloud
14. Chat groups, Web conferencing, and VoIP are examples of _________ communication.
a. asynchronous
b. synchronous
c. VoIP
d. Web 2.0
15. Text messaging is based on _________ technology.
a. URL
b. SMS
c. NAS
d. ISP
16. A(n) ________________ is a type of cybercrime in which hackers steal your personal information, such as
bank account numbers.
a. botnet
b. identity theft
c. Trojan horse
d. denial of service attack
17. The type of malware that copies itself repeatedly, using up computer and network resources, is called a(n)
______________.
a. virus
b. cookie
c. Trojan horse
d. worm
18. Which one of the following is not a network authentication method?
a. password
b. CAPTCHA system
c. fingerprint reader
d. firewall
19. You use a(n) _____________ to scramble and unscramble the data being transmitted between wireless
devices.
a. wireless network key
b. biometric device
c. ID card with a barcode
d. wireless router
20. _____________ constantly monitor all network traffic to keep your network secure.
Technology Now End of Chapter Exercise Answers Page 9 of 16
a. Modems
b. Firewalls
c. Biometric scanners
d. Spyware programs
21. In the space next to each image below, write the letter of the phrase that describes it:
a. A central point for cables in a network
b. Directs the flow of information along a network
c. Connects a device to an Ethernet network
d. A device that sends and receives data to and from a digital line
e. A card that connects a computer to a network
[Comp: Use EOC Figures 1-5 for these images—see the art manuscript]

__e__ [EOC Fig1.jpg]


__b__ [EOC Fig4.jpg]

__a__ [EOC Fig2.jpg]

__d__ [EOC Fig5.jpg]

__c__ [EOC Fig3.jpg]

Try This Now


1: Test Your Home and School Network’s Performance
Your local Internet service provider offers different connection options. You should test your network
connection to confirm it uses the speed you purchased. Test the speed of your wireless or wired network at
your home, workplace, or local coffee shop and compare it to the speed of your school’s network.

Open your browser on any computer and then visit the speedtest.net Web site. Tap or click the Begin Test
button to test the performance of each network. The test may take up to a minute to complete.

a. How did the speed of your home, workplace, or local coffee shop compare with the speed of your school’s
network? Share the download and upload speeds of each location.
Technology Now End of Chapter Exercise Answers Page 10 of 16
Answers will vary at the time of completion, but a sample solution includes similar data from speedtest.net:

b. Describe three Internet activities that would be best on the faster network speed.

Answers will vary, but a sample solution includes:


Gaming, streaming video, skype, video conferencing, file downloads

2: Locate Local Free Wi-Fi Hotspots


Knowing the location of a free Wi-Fi connection in your local area can assist you if you ever lose Internet
connectivity in your home or dorm. Open your browser on any computer and then visit the
openwifispots.com Web site. Enter the name of your closest populated town or city to locate free Wi-Fi
hotspots. Try another city if you do not find a listing of hotspots.

Sample Solution:

a. What is the name of the town or city that you researched?


Arlington

b. How many free Wi-Fi hotspots did you find?


4

c. Copy and paste the listing of free Wi-Fi hotspots from the Web site into a word-processing document.
Technology Now End of Chapter Exercise Answers Page 11 of 16

3: Create a Free Video Email


Note: This assignment requires a mobile device with a camera or a computer with a Web cam.

Connecting through a video email message adds a personal and professional touch within the business
environment. Eyejot is an easy way to send and receive video email from your computer (PC or Mac) or
mobile device, such as an Apple iPhone, iPod Touch, or Android smartphone. Open the browser on any
computer and visit the eyejot.com Web site or install the free Eyejot app on your smartphone. Create a free
Eyejot account. Record a one-minute video to your instructor using Eyejot about the interesting facts you
learned about the connected computer. Send the video email to your instructor.

a. Write a paragraph describing an example of how you could use video email in a business setting.

Answers can include any of the following:

Internal emails can function as an effective communication for sharing basic information, such as new cafeteria
prices, paper use guidelines or security precautions, for example. Sending simple messages to an entire
workforce with just the click of a mouse is fast, easy, convenient and can save the company money. If saved, the
email can function as proof of a message sent or received, and is easily accessible to remind the recipient of
pertinent information. Many businesses use email as part of its marketing efforts to share information with
prospects, customers, vendors. (http://smallbusiness.chron.com/use-email-business-communication-118.html)

b. Which device did you use to create your video email? What was your experience?

Answers will vary, including: computer web cams, smartphone cameras, and stand-alone digital video cameras.

Critical Thinking Now


1: Thinking Through Your Home Network
After moving to a new apartment complex, you are faced with setting up a wireless home network for your
iPad, Windows ultrabook, and your Android phone. Your local neighborhood has DSL available. You are on an
Technology Now End of Chapter Exercise Answers Page 12 of 16
electronics retailer’s Web site looking for the equipment that you will need to set up your home wireless
network. Create a shopping list with the items necessary to create your wireless home network, the retail
price, and the steps that you would follow to connect your devices to the wireless network.
Answers will vary depending on what the student selects. Possible solutions include:
Router $50
NIC $25
Modem $50
Firewall $100
Cables $10
Components should be connected similar to Figure 7-8.

2: Protecting Your Wireless Home Network


After reading this chapter, you realize that the wireless network in your home is not secure. Unauthorized
users could sit outside your home and perform illegal activities on your home network in your name. In
addition, they may be able to view your personal files and slow down your network speed considerably. Write
a paragraph including at least four steps that will secure your home wireless network.

Create strong passwords for your home network. Include at least eight characters, numbers, letters, or
symbols that are not easy to figure out.
Set permissions to determine who can access which resources. Limit access as much as you can.
Do not write usernames and passwords in places where they can be found by others.
Enable the highest level of encryption, such as WPA2 or WPA-TKIP, for a wireless router, and change
the router’s default administrator password.

3: World Cup Biometric Security


The FIFA World Cup Football Tournament is investigating ways to confirm the identity of the ticket holders.
FIFA is warning soccer fans to beware of fraudulent online ticket sales for the next World Cup as it works with
international agencies to use biometric security to address the problem. Write a three-paragraph proposal,
with each paragraph describing one of three biometric security technologies that could be used to determine
ticket holder authentication. Research the pros and cons of each of these biometric technologies.
Admissions

Answers will vary, but should touch on the following:

In theory, biometrics are a great way to authenticate a user: it's impossible to lose your fingerprint (barring the
most gruesome of developments), you can't forget it like you could a password, and it's unique to you.

In practice, though, there are so many things that, for now, limit a more widespread use of this technology.

One of the problems has been pointed out by Guy Churchward, CEO of LogLogic. He says that it is its uniqueness
the thing that makes using biometric data an inherently flawed choice for a primary method of authentication.

"Once you have your fingerprint scanned it will give a unique data sequence which if compromised is not exactly
something you can change," he says. "Imagine having an option of only one password 'ever'. One loss and you
are screwed."
Technology Now End of Chapter Exercise Answers Page 13 of 16
Another problem is that current scanners still can't recognize if the fingerprint is on a real finger or an artificial
one. Andrew Clarke, of e-DMZ Security, says that in theory, one could get a hold of the user's fingerprint using
techniques used in crime detection and transfer it on an artificial finger. This will likely change as the technology
evolves, but for now the system is still fallible, and not suitable to be a primary solution to the authentication
problem.

“As with all authentication, multiple factors increases the effectiveness of the solution. Something you have
(fingerprint) combined with something you know (passcode) provides a stronger solution,” he says.

According to SC Magazine, David Ting, CTO of Imprivata, sees the good side of this kind of authentication. Saying
that the contents of any computer should be encrypted, and the access to its content secured by a password
AND by biometrics. According to him, a biometric password is infinitely more difficult to recover using a brute
force attack than a "normal" password.

He is in favor of using a complex passwords initially to thwart cracking, and as regards the secure access to the
Windows logon, biometric, one-time password tokens or smartcards should be used because of the
aforementioned reason. (http://www.net-security.org/secworld.php?id=8922)

Ethical Issues Now


Today is the day you move into your new apartment. As soon as you find your tablet among your moving
boxes, you power it up to check the available balance at your online bank before you accidentally overdraw
your account. You realize that you have not contacted a local Internet service provider to set up service. Out
of curiosity, you check to see if any unsecure wireless networks are available in your apartment building. The
very strongest wireless network is named ThirdFloorBen and it is not secure.

a. How should you handle this ethical dilemma?


Answers will vary, however, the student can decide to: 1. Not use the network, 2. Visit Ben on the 3rd floor and
ask for permission to use temporarily, 3. Use the network without asking.

b. What might happen if you use the unsecured network?


Answers will vary depending on what the student decides to do. If they choose to use the network, data is
unsecured and data theft and/or identity theft could occur.

c. If your neighbor Ben introduces himself later in the day in the third floor hallway, how would you handle the
issue of his open wireless network?
Answers vary depending on previous decision.

Team Up Now – Identity Rip Off


Zoe Chambers, a college freshman, is a victim of identity theft. No one ever plans to have their identity stolen,
but ignorance can unfortunately lead to years of credit score recovery and legal tape. Cassidy Collins, a friend
of Zoe’s roommate, stayed for the weekend last month in their dorm. Cassidy used Zoe’s tablet several times
over the weekend with Zoe’s permission. Days later, Zoe realized that her online bank balance was much
lower than expected. In addition, Zoe received three separate email messages from different credit card
companies saying that she had been approved and the new credit cards had been mailed to an unknown
address. (Later, she discovered this was Cassidy’s home address.)
Technology Now End of Chapter Exercise Answers Page 14 of 16

a. Each member of the team should develop a hypothesis of how it was possible for Cassidy to steal Zoe’s
identity. Create a combined document of the individual hypotheses.
Answers will vary, however they should all point to Cassidy using Zoe’s tablet without permission and accessing
web sites that Zoe had saved log-in information for on the tablet.

b. Research what Zoe should do now. Name at least four steps that Zoe should take to investigate this crime.
Answers will vary, below are steps to take from the FBI Web site (http://www.fbi.gov/about-
us/investigate/cyber/identity_theft):
Step One: Contact the fraud department of the three major credit bureaus
•Experian (TRW) 888-397-3742
•TransUnion 800-680-7289
•Equifax 800-525-6285

Step Two: Contact the account issuer in question


•Ask for the fraud/security department of the compromised or fraudulent account issuer.
•Notify them by phone and in writing.
•Close all tampered or fraudulent accounts.
•Ask about secondary cards.

Step Three: Contact your local police department


•Notify the police department in the community where the identity theft occurred.
•Obtain copies of all police reports made.

Keep a detailed log of all contacts:


•Location called.
•Name of person(s) you spoke to.
•Title and call back number with extension.
•Ask and write down what the procedures are for that entity.

c. What are several action items that Zoe should do each month to monitor her credit?
1. Safeguard Your Social Security Number (SSN)
Social Security Numbers are the entry point for identity theft. They are the key to your personal and financial
information. For this reason, it is not recommended that SSNs be carried in wallets or purses. You should also
not write on a piece of paper your SSN to later place it in your wallet or purse. Question anyone who asks to
know your SSN. Other personal identifying information to safeguard includes passport, birth certificate, driver
license, voter registration card, alien registration card, and other forms of identification.

2. Protect Your Other Personal Information


The first step in protecting your information is to properly secure personal information such as SSN, credit card
numbers, bank and brokerage accounts, retirement accounts, birth certificate, voter registration card, alien
registration card, and others. The following are other steps to take to protect your personal information.

3. Review Your Credit Reports


The best way to learn if you are a victim of identity theft is by carefully reviewing your consumer credit report on
an ongoing basis. This minimizes potential damage because identity theft is detected earlier. The Fair Credit
Reporting Act allows consumers to obtain a free copy of their credit report once a year per credit reporting
bureau. To continuously self-monitor your credit from the three major credit bureaus, Equifax
(www.equifax.com), Experian (www.experian.com), and TransUnion (www.transunion.com) order one report in
Technology Now End of Chapter Exercise Answers Page 15 of 16
January, a second one in May, and the third one in September. You should also review the credit reports of your
under age children just in case their personal information has been compromised by identity thieves.

4. Buy a Good Shredder and Use It


The shredder is the easiest, relatively inexpensive, and best method to protect yourself from dumpster diving.
By shredding items such as preapproved credit card offers, convenience checks, bank statements, canceled
checks, deposit slips, receipt for prescriptions, and correspondence that mentions confidential information such
as SSNs and other information, you are preventing someone from obtaining, from your trash, your personal
information.

5. Reduce Your Exposure to Mail Theft


Mail theft is a significant threat to your identity. To protect your mail from theft, it is recommended that you use
a locking mailbox. If this cannot be obtained, consider using a Post Office box or a box at a private mail receiving
agency, such as The UPS Store. Other measures to protect yourself from becoming a victim of mail theft include:

6. Practice Computer and Internet Safety


The internet is your entrance to the marketplace for the world from the comfort of your home or office. When it
comes to identity theft and fraud, there are safety concerns to address because organized identity theft groups
constantly try to remotely load spyware, malware, Trojan horses, and botnets on victim computers. These
programs transmit your keystrokes and other stored computer files to suspects.

7. Be Cautious at ATMs
Identity thieves have been known to place skimming devices over ATM slots to steal card account information.
To protect your PIN number and other information, do the following: •Look for suspicious devices on the front
of the ATM. Check for exposed wires, tape, or loose connections. Look for hidden cameras on the sides of the
ATM that criminals use to records ATM passwords.

8. Opt Out of Sharing Your Information


In this information age, information about you is frequently shared with multiple business partners for product
offerings, services, and promotions. You have the choice regarding how much information you want to share
with marketing firms, companies, and certain government agencies. To help you “opt out” of information
sharing related to credit bureaus, various state departments of motor vehicles, and direct marketers, the FTC
created a one-page information site that provides detailed information and links. The URL address is
www.ftc.gov/privacy/protect.shtm.

d. Research and summarize five signs that you may be a victim of identity theft.
Refer to http://www.privacymatters.com/identity-theft-information/identity-theft-victim-5-warning-signs.aspx
1. Your bills and other financial statements don't arrive. If your regular credit card, utility and other financially
oriented bills and statements don't arrive on their usual schedule(s), someone might have changed the address.
2. There are checks missing from your checkbook. Identity theft fraud is not limited to the computer. Plenty of
opportunistic identity thieves may also be skilled pickpockets. If you keep a very well-organized checkbook and
you find any checks missing or unaccounted for, look things over again. If there are still checks missing, your
identity may have been stolen.
3. You have a debt collection agency after you. The top identity thieves are experts at "pinning the blame on
someone else." Could that someone be you? If you have a collection agency hounding you for debts you know
aren't yours, your identity may well be in danger.
4. You apply for credit and are turned down. If you apply for credit and are flatly denied, something might be
wrong.
Technology Now End of Chapter Exercise Answers Page 16 of 16
5. You receive a credit or charge card you know you never applied for. Identity theft is an invasion of your
privacy in many ways. If someone out there has your personal information, they might as well be you. Keep that
in mind if you receive a welcome letter and credit card from a company you don't recall contacting.

e. Identify a YouTube video that would be best to share at Zoe’s dorm for others not to fall victim to the same
risk.
At the time of writing, this video is available on YouTube.

How to Prevent Identity Theft For College Students


http://youtu.be/GNQ843up4_M
Another random document with
no related content on Scribd:
1.F.6. INDEMNITY - You agree to indemnify and hold the
Foundation, the trademark owner, any agent or employee of the
Foundation, anyone providing copies of Project Gutenberg™
electronic works in accordance with this agreement, and any
volunteers associated with the production, promotion and distribution
of Project Gutenberg™ electronic works, harmless from all liability,
costs and expenses, including legal fees, that arise directly or
indirectly from any of the following which you do or cause to occur:
(a) distribution of this or any Project Gutenberg™ work, (b)
alteration, modification, or additions or deletions to any Project
Gutenberg™ work, and (c) any Defect you cause.

Section 2. Information about the Mission of


Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new computers.
It exists because of the efforts of hundreds of volunteers and
donations from people in all walks of life.

Volunteers and financial support to provide volunteers with the


assistance they need are critical to reaching Project Gutenberg™’s
goals and ensuring that the Project Gutenberg™ collection will
remain freely available for generations to come. In 2001, the Project
Gutenberg Literary Archive Foundation was created to provide a
secure and permanent future for Project Gutenberg™ and future
generations. To learn more about the Project Gutenberg Literary
Archive Foundation and how your efforts and donations can help,
see Sections 3 and 4 and the Foundation information page at
www.gutenberg.org.

Section 3. Information about the Project


Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-profit
501(c)(3) educational corporation organized under the laws of the
state of Mississippi and granted tax exempt status by the Internal
Revenue Service. The Foundation’s EIN or federal tax identification
number is 64-6221541. Contributions to the Project Gutenberg
Literary Archive Foundation are tax deductible to the full extent
permitted by U.S. federal laws and your state’s laws.

The Foundation’s business office is located at 809 North 1500 West,


Salt Lake City, UT 84116, (801) 596-1887. Email contact links and up
to date contact information can be found at the Foundation’s website
and official page at www.gutenberg.org/contact

Section 4. Information about Donations to


the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission of
increasing the number of public domain and licensed works that can
be freely distributed in machine-readable form accessible by the
widest array of equipment including outdated equipment. Many small
donations ($1 to $5,000) are particularly important to maintaining tax
exempt status with the IRS.

The Foundation is committed to complying with the laws regulating


charities and charitable donations in all 50 states of the United
States. Compliance requirements are not uniform and it takes a
considerable effort, much paperwork and many fees to meet and
keep up with these requirements. We do not solicit donations in
locations where we have not received written confirmation of
compliance. To SEND DONATIONS or determine the status of
compliance for any particular state visit www.gutenberg.org/donate.

While we cannot and do not solicit contributions from states where


we have not met the solicitation requirements, we know of no
prohibition against accepting unsolicited donations from donors in
such states who approach us with offers to donate.

International donations are gratefully accepted, but we cannot make


any statements concerning tax treatment of donations received from
outside the United States. U.S. laws alone swamp our small staff.

Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.

Section 5. General Information About Project


Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could be
freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose network of
volunteer support.

Project Gutenberg™ eBooks are often created from several printed


editions, all of which are confirmed as not protected by copyright in
the U.S. unless a copyright notice is included. Thus, we do not
necessarily keep eBooks in compliance with any particular paper
edition.

Most people start at our website which has the main PG search
facility: www.gutenberg.org.

This website includes information about Project Gutenberg™,


including how to make donations to the Project Gutenberg Literary
Archive Foundation, how to help produce our new eBooks, and how
to subscribe to our email newsletter to hear about new eBooks.

You might also like