1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marysya12 [62]
3 years ago
9

what security threats do you face in your everyday computer usage? list the current security you use on your digital devices wha

t sort of security threats specifically target networks? after reading chapter 5, how will you increase your security?
Computers and Technology
1 answer:
gulaghasi [49]3 years ago
5 0

Answer:

1. The basic threat is junk mails which contains malicious links. There can also be malicious applications on the web which when downloaded can also cause the download of malware. Zero day threats are also being used by hackers to target an OS for a single day.

2. Anti virus software such as MACFREE

3.Threats such as Computer virus, computer worms, Trojan horse, Phishing, Spyware, Rootkit etc. will targets network.

4. I will increase security by:

a) Installing a firewall

b) Updating all the applications and OS

c) Verifying applications before downloading

d) Boost access control by providing strong passwords

Explanation:

You might be interested in
What is computer hacking? describe some examples
Naily [24]
Computer hacking<span> refers to the practice of modifying or altering </span>computer<span> software and hardware to accomplish a goal that is considered to be outside of the creator's original objective.
</span>
“bot,” is a computer under the control of a hacker <span>without the knowledge of the computer user.</span>

3 0
4 years ago
DMA controllers ____.A) do not utilize an additional, special purpose, processorB) are a nonstandard component in PCs of todayC)
otez555 [7]

Answer:

D) can access main memory at the same time as the main CPU

Explanation:

DMA is short for Direct Memory Access, these controllers allow the device to transfer data directly to and from the memory modules without interfering with CPU processes. Therefore it can access main memory at the same time as the main CPU. Thus freeing up CPU processing power for other tasks while also retrieving the data necessary.

8 0
3 years ago
What are the steps for inserting an internal link?
julia-pushkina [17]

Answer:

=

Worksheet

Ctrl + Enter

Explanation:

4 0
3 years ago
Read 2 more answers
What is the name of the book farrah gray published in 2005??
seropon [69]
He wrote Reallionaire
8 0
3 years ago
If you are trying to reduce the cost of college which of the following strategy is likely to save you the most money
Allisa [31]
A scholarship of any kind will work because the college pays u money and a loan will take forever to pay back and u might be in debt for a long time
7 0
3 years ago
Read 2 more answers
Other questions:
  • A job application is a form used to make a job request.<br> True<br> False
    8·2 answers
  • How do I take off the header off my second page in google docs ? ( I only need it on page 1)
    8·2 answers
  • Colin Mackay Inc., a software company with its head office in Amsterdam, has employees across three continents. The company's pr
    10·1 answer
  • Can web sites contain copyright material? <br> Yes <br> No
    10·2 answers
  • Which type of optical scanner works in a manner similar to a copy machine?
    15·1 answer
  • What are the two types of computer keyboards and how are they different?
    6·2 answers
  • The definition of network is:
    10·1 answer
  • Write a program that prompts the user to enter two positive integers less than 1,000,000,000 and the program outputs the sum of
    15·1 answer
  • The __________ statement allows you to check for
    7·1 answer
  • Need help asap please
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!