True, presentations can be saved as PDF’s it will come out as separate pages though
<u>Explanation:</u>
<em>Remember, </em>Malware is a word coined from the words Malicious-Software (Mal...ware). Thus, Malware could be defined as software that is intentionally designed by cybercriminals to gain access or cause damage to a computer or network.
a. Cindy may learn the difference between these two techniques used to create a malware attack:
- through downloads from malicious websites: An attacker may design a malicious website; in which unsuspecting users who visit the site may click to download certain files, but these are actually malware software been installed.
- through malicious emails: This email may contain attachments which if opened or downloaded by an unsuspecting user would infect their computer with malware.
b. Here are some common suggestions;
- Never open attachments from strange email addresses.
- install a paid antivirus software.
- be mindful of websites with too many ads.
A Mouse and a Keyboard are examples of eternal input devices. The monitor, printer, speaker and Fash drive are all external output devices. Seven basic internal components in a computer tower are the power supply unit, central processing unit, hard disk drive, RAM modules, motherboard, video card and a sound card.
I know that Windows computer files use the extension exe.
Task manager
.............................