Preview

CIS 1, Questions

Good Essays
Open Document
Open Document
1091 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CIS 1, Questions
CIS Questions
1. World Wide Web is a global library of information available to anyone connected to the Internet. Some of the task can be done are search for information, conduct research, watch videos, play games with other, etc. Each electronic document on the web is called a webpage, which contain text, graphics, animation, audio, and video. Downloading is when you download a file or software program, you’re you just copying it form the internet to your own computer. Website is a collection of related webpages and associated items, such as documents and pictures, stored on a web server. A web server is a computer that delivers requested webpages to your computer or mobile device. The same web server can store multiple websites.
2. 5 different ways to protect my computer from viruses and malwares are:
Disconnect your computer from the internet. If you do not need Internet access, disconnect the computer from the Internet. Some security experts recommend disconnecting from the computer network before opening emails attachments.
Enable a pop-up blocker: Malicious software creators can develop a pop-up ad, which is an Internet advertisement that suddenly appears in a new window on top of a webpages displayed in a browser. A pop-up blocker is a filtering program that stops pop-up ads from displaying on webpages. You can download the pop-up blocker for free.
Use an anti-virus program: Using an anti-virus program is one of the way to protect your computer. It is a program that you install to your computers or mobile devices to help block out viruses or malwares. It is not 100% will protect your computer from getting harm, but it is help. Be sure to use the anti-virus program from a trust and well-known brand. For example: Norton, Avast, etc.
Use a firewall.‌ Windows Firewall (or any other firewall) can help alert you to suspicious activity if a virus or worm attempts to connect to your computer. It can also block viruses, worms, and hackers from attempting to

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Malware - Can take many forms, but as the name implies, it is malicious software. It can take the form of viruses, bots, spyware, worms, trojans, rootkits, and any other software intended to cause harm. Having proper firewall and security software protection can usually prevent malware from spreading.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    1. The World Wide Web is a system with universally accepted standards for storing, retrieving, formatting, and displaying information via a client/server architecture.…

    • 3431 Words
    • 14 Pages
    Good Essays
  • Powerful Essays

    M150a Review Questions

    • 2913 Words
    • 11 Pages

    Web : The collection of linked data stored on the internet which is accessed using a browser and it is one of many services that run on the internet.…

    • 2913 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1330 Unit 7

    • 481 Words
    • 2 Pages

    World Wide Web is related to other technology components of the information system. The network links with 2 or more computers to share the data or resources. This is also a service provided by the Internet for storing, formatting and displaying information in a page formatting.…

    • 481 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 14 P1

    • 1252 Words
    • 6 Pages

    The difference between the Internet and World Wide Web is that the WWW is that its the content within the Internet. The Internet is the hardware structure that underpins all online activity. It’s the various computers around the world that holds all data together whereas the web is a software layer that sits on top of this structure and allows user to find and interact with data on computer around the world.…

    • 1252 Words
    • 6 Pages
    Good Essays
  • Good Essays

    To avoid this, users have to avoid untrusted websites and make sure to scan small attachments before opening them. Simply, reliable and trusted programs must be downloaded which are anti-virus and anti-spyware programs in order to prevent viruses. Also, users must install programs which scan a computer to detect viruses.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Malware Lifecycle

    • 463 Words
    • 2 Pages

    Next we will discuss malware what it is and how it affects us. Malware is any kind of unwanted software that is installed without your adequate consent. Viruses, worms, and Trojan horses are examples of malicious software that are often grouped together and referred to as malware. Cybercriminals sometimes try to trick you into downloading rogue (fake) security software that claims to protect you against malware. This rogue security software might ask you to pay for a fake product, install malware on your computer, or steal your personal information. To protect yourself from Malware it is important to do some of the following: make sure automatic updating is turned on to get all the latest security updates. Keep your firewall turned on. Don't open spam email messages or click links on suspicious…

    • 463 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Many times we do not address, and it has not felt it necessary to maintain its threat of our computer. It is very importance to understand how to protect the risk. My personal information is as valuable such as…

    • 637 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cybercriminals

    • 1700 Words
    • 7 Pages

    anti virus, anti spyware, firewalls, and spam filters are also effective ways of decreasing the risk of phishing scams associated with email.…

    • 1700 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    CIS Question

    • 605 Words
    • 3 Pages

    Rapid Application Development (RAD) –or prototyping- is a computer system development methodology which takes a minimalist approach. Computer software developed with RAD is more or less a “develop as you go” approach which allows systems to be developed much faster than the SDLC approach, and makes it more flexible to change the requirement.…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Malware

    • 601 Words
    • 3 Pages

    There are several methods that a computer may become damaged or corrupt. These threats are known as malicious software, or malware. If your computer is not secure with software that protects your computer, such as an anti-virus or anti-malware program, you may be risking your personal information or files created from being accessed or deleted without your knowledge. Malware may be so damaging that it can cause a company, like Amazon, to lose millions of dollars if it causes its website to shut down. Attackers will also use different methods to try and have the malware installed into a computer. The more popular known malware are viruses, worms, Trojan horses, and spam. However, there are other forms of malware which are just as dangerous.…

    • 601 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Malware

    • 483 Words
    • 2 Pages

    Avoid Microsoft products where possible. Computers using the Microsoft Windows platform are especially vulnerable as of this writing (although no operating system is immune to all potential attacks). Consider using a non-Microsoft operating system if possible. However, if you have to use Microsoft Windows and you are connecting to the Internet, your best bet is to minimize the number of Microsoft Internet applications you use – for example, use Firefox as a browser or Thunderbird as a mail client. Microsoft’s Internet Explorer and its email programs Outlook and Outlook Express are very difficult for even professionals to secure. Furthermore, adversaries tend to attack more popular platforms and applications.…

    • 483 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Option 1. Use anti-malware software (say, Malwarebytes) to remove malicious documents and also CCleaner to correct browser settings and uninstall related anti-virus and third-party applications.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Formatting Windows Xp

    • 615 Words
    • 3 Pages

    2. Make sure your network cable is unplugged from the wall (to avoid getting viruses from your local area network).…

    • 615 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Installation of Kaspersky

    • 263 Words
    • 2 Pages

    If you have existing antivirus software, you will first need to remove existing antivirus software, which you can do by download from internet.…

    • 263 Words
    • 2 Pages
    Satisfactory Essays