Answer & Explanation:
No Browsing History:
- Your browser is probably set to incognito mode, change it to general mode.
- space set on your drive to save the content from your browser might be completely filled, Make sure you have given your browser enough space on your drive to save contents.
- The number of days to record the history in your browser is set to 0, Check the settings and make sure it is not set to 0.
Phishing Scam
- Change all the credentials on the site that you have disclosed.
- Immediately report the mail to an IT department and necessary authorities.
- Mark the mail as span and block the mail id.
Suspicious File Attachment
- May be that the suspicious file contains a virus file. Often such viruses are attached to external "Show-case" files so that the victim is not able to identify them. Once the external file is tried to open, the virus slips into the main memory (your RAM) and start executing in the background, creating copies of itself and executing every copy. Soon they start eating up the main memory (The memory that runs all your programs) making your PC slow to respond.
Antivirus Software Outdated
- Connected to the Internet and update the antivirus.
Laptop's Physical Security
- Set a password.
- install a tracking software.
Answer:
online toutoring.
helpful games give mind relaxation.
Answer:
While the Internet was evolving and creating a way for organizations to connect to each other and the world, another revolution was taking place inside organizations. The proliferation of personal computers inside organizations led to the need to share resources such as printers, scanners, and data. Organizations solved this problem through the creation of local area networks (LANs), which allowed computers to connect to each other and to peripherals. These same networks also allowed personal computers to hook up to legacy mainframe computers.
An LAN is (by definition) a local network, usually operating in the same building or on the same campus. When an organization needed to provide a network over a wider area (with locations in different cities or states, for example), they would build a wide area network (WAN).
CLIENT-SERVER
The personal computer originally was used as a stand-alone computing device. A program was installed on the computer and then used to do word processing or number crunching. However, with the advent of networking and local area networks, computers could work together to solve problems. Higher-end computers were installed as servers, and users on the local network could run applications and share information among departments and organizations. This is called client-server computing.
INTRANET
Just as organizations set up web sites to provide global access to information about their business, they also set up internal web pages to provide information about the organization to the employees. This internal set of web pages is called an intranet. Web pages on the intranet are not accessible to those outside the company; in fact, those pages would come up as “not found” if an employee tried to access them from outside the company’s network.
EXTRANET
Sometimes an organization wants to be able to collaborate with its customers or suppliers while at the same time maintaining the security of being inside its own network. In cases like this a company may want to create an extranet, which is a part of the company’s network that can be made available securely to those outside of the company. Extranets can be used to allow customers to log in and check the status of their orders, or for suppliers to check their customers’ inventory levels.
Sometimes, an organization will need to allow someone who is not located physically within its internal network to gain access. This access can be provided by a virtual private network (VPN). VPNs will be discussed further in the chapter 6 (on information security).
Answer:
Examine the sources cited by the website
Explanation:
Due to the ability for everyone to create a website, and that there are no governing standards on the quality of information given on websites, it is important when conducting research to ensure that the sources on the web are up to date, accurate, and provide an objective view
Therefore, it is important to go through and examine the website critically using the the following criteria
1) The website coverage
2) The currency of the website's information
3) Weather the website is objective or not
4) The identity of the author of the website and the ability to contact the author
5) The accuracy of the information contained in the website