1. What is the internet
Is the world we use for the great network of interconnected networks on a global scale.
2.What is the difference between internet and the world wide web (www)?
Because www is a service of a internet
3. What are the basic requirements to connect a computer to the Internet? Explain briefly every item needed.
A server and terminals, a network interface card , made up of cables that join the computer because the connection that made through a router ,elements that controls and distributes the information among the computers it could be a hub or a switch and programs for transmiting information between the computers.
4.What are the most used browers?
Google chrome , Mozilla Firefox , internet explorer, etc...
6.What are the internet Search Engines for? Write the name of 3 of them.
Is a easy form to search information. Google , yahoo, msn.
7.What is the electronic mail for?
It is for share information and talk with other persons.
10. What is a blog? Where is situated the last entry in a blog?
A blog is a website and you can post everything you want. In the top of the blog
lunes, 16 de octubre de 2017
lunes, 2 de octubre de 2017
VIRUSES AND TROJAN
- Exercises
5. Find information about how to protect a computer network against viruses.Find out if your school´s network has some kind of antivirus protection.
You can protect your network using an antivirus for example avast, eset,symantec,... . The antivirus of my school is Kaspersky Antivirus
7. Find information about a Trojan and how it works. How can you prevent an attack?
The trojan virus can steal sensitive data , delete files and modify documents
5. Find information about how to protect a computer network against viruses.Find out if your school´s network has some kind of antivirus protection.
You can protect your network using an antivirus for example avast, eset,symantec,... . The antivirus of my school is Kaspersky Antivirus
7. Find information about a Trojan and how it works. How can you prevent an attack?
The trojan virus can steal sensitive data , delete files and modify documents
These are some of the most common:
- Backdoor Trojan - These Trojans can create a “backdoor” on a users’ computer, allowing the attacker access to the machine in order to control it, upload stolen data and even download more malware onto the computer.
- Downloader Trojan - The main purpose of these Trojans are to download additional content onto the infected computer, such as additional pieces of malware.
- Infostealer Trojan - This Trojan’s main objective is to steal data from the infected computer.
- Remote Access Trojan - This Trojan is designed to give the attacker full control over the computer.
- Distributed Denial of Service (DDoS) Attack Trojan - This Trojan performs DDoS attacks, which are designed to take down a network by flooding it with traffic.
How to Stay Protected:
- Computer security must begin with an Internet security suite. Run periodic diagnostic scans with your software. You can set it up so the program runs scans automatically during regular intervals.
- Update your operating system’s software as soon as the updates are available from the software company. These groups tend to exploit security holes in outdated software programs. In addition to operating system updates, you should also check for updates on other software that you use on your computer as well.
- Don’t visit unsafe websites. Most Internet security suites include a component alerting you that the site you’re about to visit is unsafe.
- Don’t download attachments or click on links in unfamiliar emails.
- Protect accounts with complex, unique passwords.
- Finally, you should always keep your personal information safe with firewalls.
Suscribirse a:
Entradas (Atom)