Premium Essay

Nt1330 Unit 1 Study Guide

Submitted By
Words 392
Pages 2
1) Make a list of things you should do to protect your privacy.
1. Use passwords on all your devices, ex. computer, cell phone.
2. Make passwords with letters, numbers, and symbols.
3. Keep passwords secret.
4. Shred loan and credit card applications you get in the mail.
5. Keep your personal information (such as social security number and bank accounts) secret even from friends and relatives.
6. Use a cross-cut shredder to shred papers with personal numbers or passwords on them.
7. Check your bank statements regularly for false charges.
8. When you deposit or cash a check, don’t write your account number on it.
9. Protect your computer with security software, such as firewalls and anti-spyware.
10. Never put personal information (such as social security …show more content…
Wipe your hard drive clean before giving away a computer.
13. Read website privacy policies.
14. Keep your credit card in sight so no one can duplicate it.
15. Don’t give out personal information when talking on your phone in public.
16. Never give account numbers or other personal numbers to telemarketers.
17. Don’t give out your credit card account numbers over a cell phone.
18. If an adult asks for your social security number/driver’s license number, tell them to ask your parent for that.
19. At age 18, start checking your credit report regularly.
2) What steps should you take if you become a victim of identity theft?
1. Call one of the 3 major credit reporting agencies and ask them to put a fraud alert on your credit file.
2. Look at your credit report (it will be free, since you issued a fraud alert).
3. Close all your accounts that have been affected by identity theft.
4. File a complaint with the Federal Trade Commission at www.ftc.gov/idtheft
5. File a police report. Give the police a copy of your FTC report.
6. Visit government websites dealing with identity theft for more information.
3) Who are your best resources if you become a victim of identity theft?
1. The 3 major credit reporting

Similar Documents

Premium Essay

Nt1330 Unit 1 Study Guide

...1.1: Discuss, with the use of diagrams, the main anatomical features of the human body. Include the cell, skeletal and the muscular system and any other distinct features you may deem appropriate. Your answer may include various types of tissue found in the human body. Intro The body has many different features that work together to ensure it functions as it should, and ensure it stays healthy. This includes regulating heat, transporting nutrients and fighting of foreign bacteria that may cause harm. These features also include assisting with the body’s voluntary movement and the sending of signals throughout the body that allow these functions to occur. The Cell The main function of the cell includes both transporting different materials used throughout the body. Cells are used in conjunction with every bodily organ and system, carrying oxygen and carbon dioxide for respiration, proteins and energy for the digestive system and making up the different tissues used to help function the body. These tissues are made up of a group of cells working together with the same function. Example of these tissues include muscular and nervous tissues, used to help the body move and send signals throughout the body respectively. As cells are used throughout the body and in every system, some cells are specialised to do certain things that other cells cannot. Most cells in the body have the same design, consisting of a nucleus, membrane and mitochondria to perform different functions within...

Words: 2127 - Pages: 9

Premium Essay

Nt1330 Unit 1 Study Guide

...1) What is an Operating system? An Operating System is a program that, after being initially loaded into the computer by a boot program, it manages all the programs in a computer where the programs are called application programs, that make use of the operating system by making requests for the services by a defined service application program interface (API). We can say that an Operating System is an interface between hardware and software. 2) Why is the Operating System viewed as a resource allocator & control program? A computer system has many resources, like Hardware and Software that might requires solution of a problem, like CPU time, Memory spaces, File storage space, Input and Output devices, for these purpose operating systems acts as a manager to...

Words: 457 - Pages: 2

Premium Essay

Test

...Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction to General Education / General Studies NT2580 NT2799 Communications Information Technology Introduction to Information Security NSANetworking Capstone...

Words: 2305 - Pages: 10

Premium Essay

Nt2640

...Belong? This course is required in the associate degree program in Network Systems Administration and associate degree in Mobile Communications Technology. The following diagrams indicate how this course relates to other courses in respective programs: Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1201 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming Technology Courses General Education/ General Studies 1 Date: 7/18/2011 IP Networking Syllabus Mobile Communications Technology MC2799 MCT Capstone Project NT2640 IP Networking MC2560 Mobile Wireless Communication I MC2660 Mobile Wireless Communication II MC2665 Mobile...

Words: 2573 - Pages: 11

Premium Essay

Nothing

...practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installation, testing and troubleshooting techniques for a computer network. Where Does This Course Belong? | | | NT2799 | | | | | | | | NSA Capstone | | | | | | | Project | | | | | NT2580 | | | NT2670 | NT2640 | | PT2520 | | Introduction to | | | | | | | | | | | Email and Web | | | | | Information | | | | IP Networking | | Database Concepts | | | | | Services | | | | | Security | | | | | | | | | | | | | | | | NT1330 | | | NT1230 | NT1430 | | PT1420 | | Client-Server | | | Client-Server | | | Introduction to |...

Words: 10839 - Pages: 44

Premium Essay

Nt 1210

...hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking ...

Words: 4400 - Pages: 18

Premium Essay

Nt1210 Introduction to Networking Onsite Course

...hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking ...

Words: 4400 - Pages: 18

Premium Essay

Unit

...ITT TECHNICAL INSTITUTE NT1310 Physical Networking GRADED ASSIGNMENTS ------------------------------------------------- Student Professional Experience Project NSA SPE Project 1 (to be completed by the end of NT1310): Install, Configure, Test, Maintain and/or Document the Worksite Local Area Network and Its Components Purpose The purpose of the Student Professional Experience (SPE) project is to provide you an opportunity for work experience in your field or in a related field to add to your résumé. You may have an opportunity to serve your community or work for a local employer for a project that will take between 20 and 30 hours. Project Logistics Career Services will identify an employer with needs in the following areas: Network related tasks (mostly confined to the LAN and Microsoft Windows Server 2008 environments) Students are expected to practice various skills discussed in all the technical courses in Quarters 1 through 3 of the NSA program at an employer’s site on network related tasks (more confined to the LAN and Microsoft Windows Networking with Server 2008 environments) that would involve installation, configuration, testing, maintenance and documentation of the worksite network and its components, and to properly document the technical information in all involved activities. Such documentation will be used as the source material for Items 2 and 3 defined in the Deliverables section of this document. Possible example projects could...

Words: 6762 - Pages: 28