Provide at least five examples of ways in which you can protect yourself from online threats.

What will be an ideal response?


• Be sure your computer has up-to-date antivirus software from a reputable company.• Be sure your computer has up-to-date firewall software from a reputable company.• Be sure your computer has up-to-date antispyware from a reputable company.• Set your browser to use a pop-up blocker.• Be sure to install the latest security patches or updates to your operating system, whatever operating system you use.• Don't open email attachments from unknown sources, especially files with .exe or .zip extensions.• Don't download software except from reputable sources.• Don't send personal or financial information in response to any email.

Computer Science & Information Technology

You might also like to view...

Critical Thinking QuestionsCase 2-1Tom is a golf pro, and he is using Outlook to manage his schedule. Some of his customers pay him for a single lesson, while others set up regular weekly lessons. In addition, Tom is coordinating the annual two-day tournament at his local golf course.According to the way that Outlook defines calendar items, what type of item is a regular weekly lesson, if you assume that the person taking the lesson is NOT invited to the lesson using Outlook? a. recurring appointmentc. recurring eventb. recurring meetingd. none of these

What will be an ideal response?

Computer Science & Information Technology

Explain the purpose of a local security group.

What will be an ideal response?

Computer Science & Information Technology

Debug means to ____.

A. Write code using the Command Button Wizard B. Find and resolve errors in code C. Use conditional expressions in code D. Use If...Then...Else statements in code

Computer Science & Information Technology

Which of the following are shortcuts to an app or other content in Windows?

A. applets B. servlets C. tiles D. keys

Computer Science & Information Technology