1. Name:
Computer #:
3.02 Protecting Your Computer and Your Data Notes
Directions: Use the following website training module to respond to each of
the statements in the table.
http://www.microsoft.com/about/corporatecitizenship/citizenship/giving/programs/up/digitalliter
acy/content/eng/courses/2698BE/wrapper.htm
STATEMENT RESPONSE
Topic: Guidelines for Protecting Your Computer
1. List seven (7) guidelines for
safeguarding the operating
environment and data on your
computer.
Implement user identification
Set username and password
Keep password secure
Lock computer
Install and update protective software
Encrypt data
Back up data
2. What is an example of implementing
user identification?
You can give people restrictions and
privileges on the windows vista.
3. List three (3) important tips for
keeping your password secure.
Don’t share password with others
Don’t right password and leave it on the table
or desk
IF YOU THINK THAT THE PASSWORD
HAS BEEN COMPROMISED CHANGE IT
IMMEDIATELY.
4. What do antivirus and antispyware
software do?
Anti-virus detects and removes viruses and
spyware presents in your computer.
5. List two (2) things that a firewall does. Filters out the content that reaches your
computer.
6. Converting your data to an unreadable
form to protect it from unauthorized
access is called?
encryption
Topic: Best Practices for Securing Online and Network Transactions
7. List seven actions you can take to
secure online and network
transactions.
Make sure it is https
Make sure it has ssl
Make sure that there is a padlock icon
Make sure there is a certificate for the website
Make sure the SSL protocol is genuine
Make sure you receive a message confirming
the purchase
Make sure the information you receive is
encrypted
2. Name:
Computer #:
8. What should a strong password
include?
Combination of uppercase lowercase letters
and numbers and special characters
9. What is your primary defense against
security and privacy threats?
A strong password
10. What is spyware? When a hacker hacks your computer and
moves data from your computer to the
hackers computer
11. Define cache memory. The temporary memory stored in your
computer
12. What should you do on a regular basis
to prevent hackers from accessing
your personal information?
Ensure that it is a secured site and there is a
specific for providing information
13. What prefix indicates that a Web site
is secure?
Https
14. List four components of the Windows
Security Center.
Firewall, automatic Updates, malware
protection, and other security settings
15. Small programs that get installed on
your computer while you are browsing
the Internet.
Cookies
Topic: Measures for Securing E-Mail and Instant Messaging
16. What are five actions you can take to
protect your computer and data when
using e-mail and instant messaging?
Avoid opening the messages
17. The most common pathway for the
spread of computer viruses.
Opening emails from unknown messengers
18. What should you do if you receive
unsolicited messages?
Do not open them respond to them
19. A common activity used to extract
personal information from computer
users and then use the information for
malicious purposes.
Phishing
20. Developing communication with new
and unknown individuals makes you
more vulnerable to what kind of
threats?
Hackers
21. Measures for Protecting Your Computer Game (On Web module)
List your results below.
Avoid Online Threats
Clear browsing history periodically
Disable active content
Protect against hacking and
spyware
Avoid sharing personal info
Protect Computer Data
Back up data
Keep password secure
Implement user identification
Install an uptdate protective
software
22. Your Side of the Story:
Directions: Describe any experiences you have had with the topics discussed in this module
about protecting your computer and data. (At least 1 paragraph)
3. Name:
Computer #:
I have not had any experiences with this topic. I never have been hacked or had a website
where I had to make sure to do all of this stuff. How to protect your computer is simple. Install
all security settings. And make sure to keep your computer up to date so know hackers can get
information.