Module 5: Digital Security, Ethics, and Privacy: Avoiding and Recognizing Threats
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Discovering Computers: Digital Technology, Data, and Devices, 17e
1
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
1
Icebreaker: Interview Simulation
You may have heard of Facebook hackers who use people’s personal data to make fake IDs, log into people’s social networks, and more.
What precautions can you take to help avoid getting into this type of situation?
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
2
Module Objectives (1 of 1)
By the end of this module, you should be able to:
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
3
Risks Associated with Technology Use�(1 of 5)
Figure 5-1 You can protect yourself from digital security risks.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
4
Cybercrimes and Criminals (2 of 5)
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
5
Risks Associated with Technology Use�(3 of 5)
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
6
Risks Associated with Technology Use�(4 of 5)
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
7
Cybercrimes and Criminals (5 of 5)
Table 5-1 Social engineering principles.
Principle | Description | Example |
Authority | Directed by someone impersonating authority figure or falsely citing their authority | “I’m the CEO calling.” |
Intimidation | To frighten and coerce by threat | “If you don’t reset my password, I will call your supervisor.” |
Consensus | Influenced by what others do | “I called last week and your colleague reset my password.” |
Scarcity | Something is in short supply | “I can’t waste time here.” |
Urgency | Immediate action is needed | “My meeting with the board starts in five minutes.” |
Familiarity | Victim well-known and well-received | “I remember reading a good evaluation on you.” |
Trust | Help a person known to you | “You know who I am.” |
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
8
Ethics and Society (1 of 4)
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
9
Ethics and Society (2 of 4)
Information Accuracy
Figure 5-3 A digitally edited photo that shows a fruit that looks like an apple on the outside and an orange on the inside.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
10
Ethics and Society (3 of 4)
Intellectual Property Rights
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
11
Ethics and Society (4 of 4)
Green Computing
Figure 5-5 A list of suggestions to make computing healthy for the environment.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
12
Internet and Network Attacks (1 of 6)
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
13
Internet and Network Attacks (2 of 6)
Table 5-2 Common types of malware.
Type | Description |
Adware | A program that displays an online advertisement in a banner, pop-up window, or pop-under window on web pages, email messages, or other Internet services |
Ransomware | A program that blocks or limits access to a computer, phone, or file until the user pays a specified amount of money |
Rootkit | A program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device |
Spyware | A program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online |
Trojan horse | A program that hides within or looks like a legitimate program. Unlike a virus or worm, a Trojan horse does not replicate itself to other computers or devices |
Virus | A potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user’s knowledge or permission |
Worm | A program that copies itself repeatedly, for example, in memory or on a network, using up resources and possibly shutting down the computer, device, or network |
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
14
Internet and Network Attacks (3 of 6)
Botnets
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
15
Internet and Network Attacks (4 of 6)
Denial of Service Attacks
Back Doors
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
16
Internet and Network Attacks (5 of 6)
Figure 5-5 Spoofers alter the components and header of an email message so that it appears the message originated from a different sender.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
17
Internet and Network Attacks (6 of 6)
Practices for Protection from Viruses and Other Malware
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
18
Knowledge Check Activity 5-1
True or False?
Rootkit is the only type of malware that is a back door.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
19
Knowledge Check Activity 5-1: Answer
Rootkit is the only type of malware that is a back door.
Correct Answer: True
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
20
Secure IT: Protect Yourself and Your�Data (1 of 7)
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
21
Secure IT: Protect Yourself and Your�Data (2 of 7)
Table 5-3 Uses of personal information.
Organization | Information | Valid Use | Invalid Use |
School | Telephone number | Call you about an advising appointment | Give to credit card company who calls you about applying for a new credit card |
Hospital | Medical history | Can refer to past procedures when you are admitted as a patient | Sell to drug company who sends you information about its drugs |
Employer | Personal email address | Will send to you the latest company newsletter | Provide to a local merchant who is having a holiday sale |
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
22
Secure IT: Protect Yourself and Your�Data (3 of 7)
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
23
Secure IT: Protect Yourself and Your�Data (4 of 7)
Figure 5-8 How a firewall works.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
24
Secure IT: Protect Yourself and Your�Data (5 of 7)
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
25
Secure IT: Protect Yourself and Your�Data (6 of 7)
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
26
Secure IT: Protect Yourself and Your�Data (7 of 7)
Table 5-4 Various backup methods.
Type of Backup | Description | Advantages | Disadvantages |
Full Backup | Copies all of the files on media in the computer | Fastest recovery method; all files are saved | Longest backup time |
Differential backup | Copies only the files that have changed since the last full backup | Fast backup method; requires minimal storage space to back up | Recovery is time-consuming because the last full backup and the differential backup are needed. |
Incremental backup | Copies only the files that have changed since the last full or incremental backup | Fastest backup method; requires minimal storage space to back up; only most recent changes saved | Recovery is most time-consuming because the last full backup and all incremental backups since the last full backup are needed. |
Selective backup | Users choose which folders and files to include in a backup | Fast backup method; provides great flexibility | Difficult to manage individual file backups; least manageable of all the backup methods |
Continuous data protection | All data is backed up whenever a change is made. | The only real-time backup; very fast recovery of data | Very expensive and requires a great amount of storage |
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
27
Wireless Security (1 of 5)
Protect Mobile Devices
Precautions
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
28
Wireless Security (2 of 5)
Table 5-5 Configuration settings for wireless routers.
Wireless Router Settings | Explanation | Recommended Configuration |
Access password | This requires a password to access the configuration settings of the device. | Create a strong password so that attackers cannot access the wireless router and turn off the security settings |
Remote management | Remote management allows the configuration settings to be changed from anywhere through an Internet connection. | Turn off remote management so that someone outside cannot access the configuration settings |
Service Set Identifier (SSID) | The SSID is the name of the local wireless network. | Change this from the default setting to a value that does not reveal the identity of the owner or the location of the network (such as MyWireNet599342) |
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
29
Wireless Security (3 of 5)
Table 5-5 Configuration settings for wireless routers (continued).
Wireless Router Settings | Explanation | Recommended Configuration |
Wi-Fi Protected Access 2 (WPA2) Personal | WPA2 encrypts the wireless data transmissions and also limits who can access the Wi-Fi network. | Turn on WPA2 and set a strong pre-shared key, which must also be entered once on each mobile device |
Wi-Fi Protected Setup (WPS) | WPS simplifies setting up the security on a wireless router. | Turn off WPS due to its security vulnerabilities |
Guest access | Guest access allows temporary users to access the wireless network without any additional configuration settings. | Turn on guest access when needed and turn it back off when the approved guests leave |
Disable SSID broadcasts | This prevents the wireless router from advertising the wireless network to anyone in the area. | Leave SSID broadcasts on; turning them off only provide a very weak degree of security and may suggest to an attacker that your network has valuable information |
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
30
Wireless Security (4 of 5)
Secure Your Wireless Network
The following list provides suggestions for securing your wireless network.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
31
Wireless Security (5 of 5)
Cloud Data Privacy
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
32
Information Privacy (1 of 11)
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
33
Information Privacy (2 of 11)
Passwords
Figure 5-9 User sign in requiring password.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
34
Information Privacy (3 of 11)
Table 5-6 Ten most common passwords.
Rank | Password |
1 | 123456 |
2 | 123456789 |
3 | qwerty |
4 | password |
5 | 1111111 |
6 | 12345678 |
7 | abc123 |
8 | password1 |
9 | 1234567 |
10 | 12345 |
Table 5-7 Numbers of possible passwords.
Password length | Number of possible Passwords | Average attempts to Break Password |
2 | 9025 | 4513 |
3 | 857,375 | 428,688 |
4 | 81,450,625 | 40,725,313 |
5 | 7,737,809,375 | 3,868,904,688 |
6 | 735,091,890,625 | 367,545,945,313 |
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
35
Information Privacy (4 of 11)
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
36
Information Privacy (5 of 11)
Biometrics
Figure 5-10 Facial recognition.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
37
Information Privacy (6 of 11)
Figure 5-12 Two-factor authentication.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
38
Information Privacy (7 of 11)
CAPTCHAs
Figure 5-13 CAPTCHAs verify human usage.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
39
Information Privacy (8 of 11)
Encryption
Browser Security
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
40
Information Privacy (9 of 11)
Protect your Personal and Financial Information
Actions to Protect Your Personal and Financial Information
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
41
Information Privacy (10 of 11)
Protecting Your Online Profile
Privacy Laws
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
42
Information Privacy (11 of 11)
Table 5-8 Some U.S. privacy laws.
Law | Purpose |
Children’s Internet Protection Act | Protects minors from inappropriate content when accessing the Internet in schools and libraries |
Children’s Online Privacy Protection Act (COPPA) | Requires websites to protect personal information of children under 13 years of age |
Digital Millennium Copyright Act (DMCA) | Makes it illegal to circumvent antipiracy schemes in commercial software; outlaws sale of devices that copy software illegally |
Freedom of Information Act (FOIA) | Enables public access to most government records |
HIPAA (Health Insurance Portability and Accountability Act) | Protects individuals against the wrongful disclosure of their health information |
PATRIOT (Provide Appropriate Tools Required to Intercept and Obstruct Terrorism) | Gives law enforcement the right to monitor people’s activities, including web and email habits |
Privacy Act | Forbids federal agencies from allowing information to be used for a reason other than that for which it was collected |
Fair and Accurate Credit Transactions Act (FACTA) | Provides rules for financial institutions, including lenders and credit reporting agencies, to protect consumers from fraud and identity theft |
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
43
Discussion Activity 5-1
Biometric devices are gaining in popularity. Discuss the advantages and disadvantages of using biometrics over passwords/PINs.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
44
How To: Establish Policies to Ensure�Safety (1 of 7)
Figure 5-14 Sample IT code of conduct.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
45
How To: Establish Policies to Ensure�Safety (2 of 7)
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
46
How To: Establish Policies to Ensure�Safety (3 of 7)
Employee Monitoring
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
47
How To: Establish Policies to Ensure�Safety (4 of 7)
Disaster Recovery
Emergency Plan
An emergency plan specifies the steps and is organized by type of disaster and includes:
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
48
How To: Establish Policies to Ensure�Safety (5 of 7)
Backup Plan
The backup plan specifies how to use backup files and equipment to resume computer operations, and includes:
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
49
How To: Establish Policies to Ensure�Safety (6 of 7)
Recovery Plan:
The recovery plan specifies the actions to restore full computer operations such as replacing hardware or software.
Test Plan:
The test plan includes simulating various levels of disasters and recording the ability to recover.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
50
How To: Establish Policies to Ensure�Safety (7 of 7)
Table 5-9 Considerations for disaster recovery.
Disaster Type | What to Do First | What Might Occur | What to Include in the Plan |
Natural (earthquake, hurricane, tornado, etc.) | Shut off power Evacuate, if necessary Pay attention to advisories Do not use phone lines if lightning occurs | Power outage Phone lines down Structural damage to building Road closings, transportation interruptions Flooding Equipment damage | Generator Satellite phone, list of employee phone numbers Alternate worksite Action to be taken if employees are not able to come to work/leave the office Wet/dry vacuums Make and model numbers and vendor information to get replacements |
Man-made (hazardous material spill, terrorist attacks, fire, hackers, malware, etc.) | Notify authorities (fire departments, etc.) of immediate threat Attempt to suppress fire or contain spill, if safe to do so Evacuate, if necessary | Data loss Dangerous conditions for employees Criminal activity, such as data hacking and identity theft Equipment damage | Back up data at protected site Protective equipment and an evacuation plan Contact law enforcement Make and model numbers and vendor information to obtain replacements |
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
51
Ethics and Issues: Inclusivity and
Digital Access (1 of 2)
Digital Inclusion
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
52
Ethics and Issues: Inclusivity and
Digital Access (2 of 2)
Some barriers to digital inclusion include:
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
53
Case Study Activity 5-1 (1 of 2)
Ms. Hania is a math teacher and uses her laptop only once a month for making assignments. One day, after starting her laptop and signing in to the operating system, a message was displayed stating that her virus protections are out of date and need to be updated.
She is worried she got a virus.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
54
Case Study Activity 5-1 (2 of 2)
After reading the case study on the previous slide, answer the following question:
What should Ms. Hania’s next step be?
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
55
Case Study Activity 5-1: Answer
What should Ms. Hania’s next step be?
Answer: d
Reinstall the protection software
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
56
Self-Assessment
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
57
Summary
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
58