8. Copyright doesn't protect a) Facts b) Operating methods c) None of the above d) All of the above Occupational health and safety (OHS), is a multidisciplinary field concerned with the safety, health, and welfare of people at a) home b) work c) public places d) (a) and (b) 10. Which of the following practices helps create a good working environment? a) Protecting computer monitors from reflections and glare by correct positioning b) Taking infrequent breaks away from the computer c) Keeping the office cold and using low overhead lighting d) Use of non-adjustable chairs when working with computers 11. Computer use can cause repetitive strain injury (RSI). Which of the following is the best way to avoid this? a) Ensure your computer is in a well-lit area b) Use an operator chair without arms c) Place your monitor at the correct height d) Work with your wrists level with the keyboard 12. Which one of the following is the best way to maintain good posture? a) Ensure your computer is in a well-lit area. b) Make sure that there are no cables on the floor c) Make sure that your computer is using a fast processor. d) Make sure that your computer, desk and chair are positioned correctly. 4. Which one of the following is a good password policy for an organisation? a) All passwords are changed regularly b) All passwords are never changed c) All passwords are made up of less than four characters d) All passwords are made up of less than four numbers 5. What is encryption and why is it used? a) Encoding of data to prevent infection by computer viruses b) Encoding of data to prevent data getting lost c) Encoding of data to prevent accidental deletion d) Encoding of data to prevent unauthorized access to data 6. Which one of the following is a way to prevent the theft of data from a computer? a) Use an up to date anti-virus program b) Back up data on a regular basis. c) Remove the monitor when not in use d) Set up a username and password 7. Which of the following is a good password policy for an organisation? a) All passwords are made up of upper and lower case letters and numbers b) All passwords are never changed c) All passwords are made up of less than four characters d) All passwords are made up of less than four numbers 1. Privacy laws are important for many businesses, as it involves in collecting and using customers' personal information. The Privacy Act sets out rules with which many businesses must comply regarding the of personal information. a) Collection and use b) Collection, use and storage c) Collection, use, storage and disclosure d) Collection, use, storage, disclosure and selling 2. There are rules governing the storage and supply of computer-based information. What are these rules called? a) Data Privacy Policy b) Data Management Act c) Data Protection Act d) Data Publicity Law 3. Which one of the following statements describes a good approach to information security for an organisation? a) There are no procedures for reporting security lapses. b) Staff passwords are not changed regularly. c) Sensitive data is available to everyone that requests it. d) Keeping an off-site backup of all files