List at least five different practices to adopt in order to protect your computer from viruses and other malware.
What will be an ideal response?
Student responses will vary, but should be drawn from the following information from the text.
Although it is impossible to ensure a virus or malware never will attack a computer, you can take steps to protect your computer by following these practices:
• Use virus protection software. Install a reputable antivirus program and then scan the entire computer to be certain it is free of viruses and other malware. Update the antivirus program and the virus signatures (known specific patterns of viruses) regularly.
• Use a firewall. Set up a hardware firewall or install a software firewall that protects your network's resources from outside intrusions.
• Be suspicious of all unsolicited email attachments. Never open an email attachment unless you are expecting it and it is from a trusted source. When in doubt, ask the sender to confirm the attachment is legitimate before you open it. Delete or quarantine flagged attachments immediately.
• Disconnect your computer from the Internet. If you do not need Internet access, disconnect the computer from the Internet. Some security experts recommend disconnecting from the computer network before opening email attachments.
• Download software with caution. Download programs or apps only from websites you trust, especially those with music and movie sharing software.
• Close spyware windows. If you suspect a pop-up window (rectangular area that suddenly appears on your screen) may be spyware, close the window. Never click an Agree or OK button in a suspicious window.
• Before using any removable media, scan it for malware. Follow this procedure even for shrink-wrapped software from major developers. Some commercial software has been infected and distributed to unsuspecting users. Never start a computer with removable media inserted in the computer unless you are certain the media are uninfected.
• Keep current. Install the latest updates for your computer software. Stay informed about new virus alerts and virus hoaxes.
• Back up regularly. In the event your computer becomes unusable due to a virus attack or other malware, you will be able to restore operations if you have a clean (uninfected) backup.
You might also like to view...
By default, labels are aligned along the left edge of a cell.
Answer the following statement true (T) or false (F)
To collaborate means to work with others as a team in an intellectual endeavor to complete a shared task or to achieve a shared goal
Indicate whether the statement is true or false
In addition to referring to cells by their cell references, it is easier to remember where different data is stored by assigning a meaningful, descriptive ____________________ to each cell or range.
Fill in the blank(s) with the appropriate word(s).
When you empty the trash on your computer what happens?
A. Data in the sectors where deleted files were stored is removed. B. The sectors that held the deleted files are overwritten with zeros. C. The index marks the sectors as available for storing new data. D. The data is shredded so it can never be recovered.