Critical Thinking QuestionsCase 1-2John's new computer has started to perform oddly and he is concerned that it may have become infected with malware. He knows that you work for a company that produces antivirus software so he gives you a call to ask for advice. List at least six reasons you can give John for preventing viruses and other malware.
What will be an ideal response?
1. Never start a computer with removable media inserted in the drives or plugged in the ports, unless the media are uninfected.
2. Never open an e-mail attachment unless you are expecting it and it is from a trusted source.
3. Set the macro security in programs so that you can enable or disable macros. Enable macros only if the document is from a trusted source and you are expecting it.
4. Install an antivirus program on all of your computers. Update the software and the virus signature files regularly.
5. Scan all downloaded programs for viruses and other malware.
6. If the antivirus program flags an e-mail attachment as infected, delete or quarantine the attachment immediately.
7. Before using any removable media, scan the media for malware. Follow this procedure even for shrink-wrapped software from major developers. Some commercial software has been infected and distributed to unsuspecting users.
8. Install a personal firewall program.
9. Stay informed about new virus alerts and virus hoaxes.
You might also like to view...
The easiest approach to program event-driven three-dimensional object behavior is by using keyboard keys.
Answer the following statement true (T) or false (F)
ADTs illustrate the principle of ____.
A. information hiding B. privacy C. encapsulation D. overloading
A Microsoft ________ App is an app that will run on any Windows device
Fill in the blank(s) with correct word
?
?
Referring to the figure above, which item indicates the hash tag to use as the source for the widget?
A. a B. b C. c D. none of these