Home Random Page


CATEGORIES:

BiologyChemistryConstructionCultureEcologyEconomyElectronicsFinanceGeographyHistoryInformaticsLawMathematicsMechanicsMedicineOtherPedagogyPhilosophyPhysicsPolicyPsychologySociologySportTourism






Malware: What you need protection from

  • Viruses copy themselves to other disks to spread to other computers. They can be merely annoying or they can be vastly destructive to your files.
  • Trojans hide inside something else to sneak in unwanted programs. You don't know that they are there, like the famous Trojan horse. These are often used to capture your logins and passwords.
  • Worms are unwanted programs that are transferred over network or Internet connections to spread themselves quickly.
  • Spyware programs lurk on your computer to steal important information, like your passwords and logins and other personal identification information and then send it off to someone else.
  • Zombie programs take control of your computer and use it and its Internet connection to attack other computers or networks or to perform other criminal activities.
  • Phishing (pronounced like the word 'fishing') is a message that tries to trick you into providing information like your social security number or bank account information or logon and password for a web site. The message may claim that if you do not click on the link in the message and log onto a financial web site that your account will be blocked, or some other disaster.
  • Spam is email that you did not request and do not want. One person's spam is another's useful newsletter or sale ad. Spam is a common way to spread viruses, trojans, and the like.
  • Browser hijacking occurs when one of the nasties takes control of your browser, sending you to sites that you did not mean to go to. This may be a porn site or it may look like a real banking, sales, or credit card site. The purpose is to steal your personal and financial information or to run up the number of page views for ads on the page so that the advertisers will pay them more money.

Programs that add protection:

Anti-virus programs monitor the computer for the activity of viruses and similar nasties.

Anti-spyware programs similarly monitor your computer, looking for known trouble-makers as well as suspicious behavior.

Anti-spam software tries to identify useless or dangerous messages for you.

A firewall blocks attempts to access your files over a network or internet connection. Your network router or modem or both may have a hardware firewall built into it. That will block incoming attacks. But you still need a software firewall on your computer to block outgoing attacks. Your computer can become infected through shared disks or even from another computer on the network. So you need to monitor what your computer is putting out over the network or internet also.

System Software: Quiz

For each question, click on the radio button beside your answer. You will be notified immediately whether your choice is correct or not. Double clicking may work better.

Top of Form

1. The operating system for a computer does the following:

manages the disks and files

manages the computer's resources

manages the computer's memory

all of the above

none of the above

2. Spooling helps because _____.



it is a more secure method of accessing data

print jobs go more smoothly with less stop and go

the computer is released to do other things while still printing

none of the above

3. A proprietary operating system is ____.

unique to a manufacturer

similar to those of other manufacturers

used by many different computer manufacturers

properly configured to operate

4. A computer's BIOS will ____

check for the presence of peripherals like mouse, sound card, scanner

defragments the hard disk

be loaded first when the computer is powered on

none of the above

5. Windows versions before Windows 95 _____

a. are proprietary operating systems

b. are not operating systems at all

c. rely on DOS as the operating system

d. were the first successful graphical operating systems

e. both a and d

f. both b and c

g. a, b, c, and d

6. A backup program _____.

makes a copy of files you select.

returns you to the previous program

undoes the last change you made

none of the above

7. An operating system or other program that has reached end-of-life in its life cycle will _____.

no longer work

still work but will not get new updates except for security updates

still work but will not get any updates or support at all

automatically upgrade to the next newest version

8. When a computer is "swapping", it is _____.

moving data from the hard drive to a removable drive

moving data from memory to the swap file on the hard drive

moving data between registers in memory

none of the above

9. A computer virus can be _____.

annoying only

damaging to your data

copied without your knowledge onto removable drives used in the infected computer

all of the above

10. A foreground task has more _____ than a background task.

buffers

microseconds

registers

time slices


Date: 2015-01-11; view: 949


<== previous page | next page ==>
System Software: Utilities | Programming: Intro
doclecture.net - lectures - 2014-2024 year. Copyright infringement or personal data (0.008 sec.)