You are on page 1of 5

LEARNING

MODULE 3 IN
IN IT
SUBMITTED TO: MR. DOMINIC R. JARA
SUBMITTED BY: MIKE ANGELO DUQUE
Engage

Your computer is at risk! It's all over the news. We hear it every day, but

what does that mean? How will you protect and secure your computer? How will

you protect your data and information that are currently saved on your

computer storage?

-The meaning of spreading news. we must take care of our computers to make

them safe. And this is how i protect my computer. I Access to all equipment,

wireless networks and sensitive data should be guarded with unique user names

and passwords keyed to specific individuals. ... If you create a master

document containing all user passcodes, be sure to encrypt it with its own

passcode and store it in a secure place.


EXPLORE
1. A message appears on your computer screen stating that your antivirus
program detected an infected file on your computer and is unable to move it
to quarantine. What are your next steps?

-Remove the file that has a virus because. a quarantined file isn't deleted.
It shows signs of infection, but by being in quarantine, the file has no
opportunity to infect your computer. It's safe. If the file can be fixed and
the infection eliminated, the file can be removed from quarantine and put
back into service.

2. While installing the latest version of Microsoft Office, the installation


program prompts you to enter the product key. Once you finish entering the
product key, you receive an error message stating that the product key
already is in use. What might be causing this?

-If you get this message, this means that your product key was purchased in a
different country or region than where you're currently located.

ELABORATE: THINK BREAK

1. A message appears on your computer screen stating that your antivirus


program detected an infected file on your computer and is unable to move it
to quarantine. What are your next steps?
-Some malware may embed itself in system files and may require a clean system
installation to resolve the issue. Others can be quarantined and removed from
‘safe’ mode, but not from regular running. Also, you may need to run the
antivirus as ‘admin’ or ‘root’ to have sufficient privileges for deleting
certain files. In sum, there is no one size fits all solution, you need to do
some footwork (or toe work, to be precise) to find the right thing for your
issue.

2. While installing the latest version of Microsoft Office, the installation


program prompts you to enter the product key. Once you finish entering the
product key, you receive an error message stating that the product key
already is in use. What might be causing this?

-If you get this message, this means that your product key was purchased in a
different country or region than where you're currently located.

3. You are writing a research paper for your history class and have found a
photo on the Web that you would like to use. You are cautious about using
photos on the Web because of copyright issues and photos that have been
altered digitally. How might you verify the validity of a photo on the Web?

A ‚verification photo‛ is a low-tech — but effective — anti-fraud measure


used by Swappa to keep the marketplace safe. A verification photo contains
the item being sold along with a unique code provided by Swappa

EVALUATE: WORKSHEET 6

1.What Are Various Internet and Network Attacks, and How Can Users Safeguard
against These Attacks?

Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks.


Man-in-the-middle (MitM) attack. Phishing and spear phishing attacks. Drive-
by attack

2.What Are Techniques to Prevent Unauthorized Access and Use?.

The techniques to Prevent Unauthorized Access and Use are Install all Security
Patches, Browsing the Internet? Pay Due Attention to File Sharing,
Keep the Firewall On, Carefully Read Your Email messages and Know the Senders,
Maintain a Proper Backup of Your Data Online, Make Use of Strong Passwords.

3. What Are Safeguards against Hardware Theft and Vandalism?

There are many simple steps to protect against hardware theft. Use physical
access controls to your hardware such as locked doors and windows. Use cables
to lock your equipment to a table, desk, or floor. Never leave a notebook
computer or mobile device unattended in a public place

4. What Risks and Safeguards Are Associated with Wireless Communications?

Data interception because the practice of listening to the transmissions of


various wireless network users. Cracking: an attempt to access a local
network or the Internet. Transmission jamming: sending out radio signals so
as to interfere with traffic.

5. What Are Issues Surrounding Information Privacy?

Privacy concerns exist wherever personally identifiable information or other


sensitive information is collected and stored – in digital form or otherwise.
Improper or non-existent disclosure control can be the root cause for privacy
issues.

1. B 5.C

2. D 6.C

3.B 7.D

4.B 8.C

CHAPTER 6: INFORMATION SYSTEM DEVELOPMENT AND PROGRAMMING LANGUAGES

ENGAGE

Imagine yourself 10 years from now, you work on a tech-company as software


engineer or software develop and you are given a customer that requires you
to create a software that will make their inventory process works more
efficient and effective? What will you do? Expound your answer.

EXPLORE

As you reflect on the engage statement, I want you to answer the following.

1) How will you assess your customer needs?

A customer needs assessment is a detailed look at the needs and expectations


of your customers

2) How will you develop your project?

Focus on your project and do it properly


3) What will manage the development of your project?

This is how I manage my project development

*Define Project Scope.


*Know your timeline.
*Assess your available resources.
*Create a project plan.
*Communicate with the team.
*Delegate Work According to Available Resources.
*Document Everything!
*Monitor the project progress

You might also like