Connecting to the Internet

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following scenarios would most likely require a broadband connection over a baseband connection?

  • Conducting a simple online text search
  • Reading a text-based document.
  • Streaming high-definition video content. (correct)
  • Accessing emails with text-based content.

What is the core difference between Kbps, Mbps and Gbps, in the context of data transmission?

  • They indicate different measures of data transmission speed. (correct)
  • They are different transfer protocols with varying levels of security.
  • They represent different standards established by various Internet providers.
  • They are updated versions of modems that operate at varying frequencies.

What is the most significant limitation of DSL technology compared to other broadband technologies?

  • DSL cannot support voice and data transmissions simultaneously.
  • DSL speed and availability are affected by the user's distance from the phone company's switching office. (correct)
  • DSL is susceptible to interference from household appliances.
  • DSL requires specialized equipment that can increase costs.

Considering the historical progression of internet access technologies, what was the principal advantage of dial-up connections (narrowband) at the time of its popularity?

<p>Ubiquitous availability using existing telephone infrastructure. (D)</p>
Signup and view all the answers

Why is the distinction between dynamic and static IP addresses significant for businesses hosting their own servers?

<p>Static IP addresses are required to ensure a consistent and easily accessible address for the server. (D)</p>
Signup and view all the answers

Which of the following factors primarily determines who controls content published on the Internet?

<p>Individual content creators and website operators. (D)</p>
Signup and view all the answers

Why was the development of TCP/IP protocol essential for the growth of the Internet?

<p>It allowed for standardized communication between different networks, ensuring interoperability. (C)</p>
Signup and view all the answers

What distinguishes the World Wide Web from the Internet?

<p>The web operates using HTTP and browsers to access multimedia content, while the Internet provides the physical network for data transfer. (D)</p>
Signup and view all the answers

How do web browsers primarily interpret and display content from web servers?

<p>By rendering HTML code to display text, images and other elements. (C)</p>
Signup and view all the answers

How does the structure of a URL enable users to access a specific resource on the web?

<p>It combines the protocol, domain name, directory path, and file name to pinpoint the resource's location. (A)</p>
Signup and view all the answers

What role does HTML play in the functionality of hyperlinks on the web?

<p>HTML defines the structure and content of a webpage, including the anchor elements (<a> tags) that create hyperlinks. (C)</p>
Signup and view all the answers

How do individual search engines compile their searchable databases?

<p>By employing software programs called spiders or crawlers to index web content. (C)</p>
Signup and view all the answers

How do subject directories differ from individual search engines in organizing and presenting information?

<p>Subject directories are compiled and maintained by human editors, while search engines use automated web crawlers. (D)</p>
Signup and view all the answers

In what way do metasearch engines enhance the search process compared to using a single search engine?

<p>By simultaneously querying several search engines and aggregating the results. (C)</p>
Signup and view all the answers

How does comparing a general search engine and a specialized search engine refine the search process?

<p>General search engines index the entire web, but specialized search engines focus on particular subjects. (C)</p>
Signup and view all the answers

Why is Wikipedia not considered an entirely reliable or authoritative source by some academics and librarians?

<p>Wikipedia is open to editing by anyone, which can lead to inaccuracies and lack of consistent expert oversight. (D)</p>
Signup and view all the answers

How does the use of tags enhance information retrieval on the Internet?

<p>Tags classify and link content, making it easier to find related information and sites. (B)</p>
Signup and view all the answers

How does SMTP facilitate email communication on the Internet?

<p>It transfers outgoing emails from a user's computer to an email server. (B)</p>
Signup and view all the answers

What is the primary function of POP3 in the process of receiving emails?

<p>Downloading email from a server to a local computer. (A)</p>
Signup and view all the answers

Why is it important to use the address-book feature in email programs?

<p>To efficiently manage and organize email contacts. (C)</p>
Signup and view all the answers

Considering email netiquette, which behavior is often considered inappropriate?

<p>Sending large file attachments without prior consent from the recipient. (B)</p>
Signup and view all the answers

What is a primary difference between instant messaging (IM) and traditional email?

<p>IM enables real-time communication with specified users, while email does not. (B)</p>
Signup and view all the answers

How do mailing lists facilitate group communication?

<p>By distributing email messages sent to the list's email address to all subscribers. (C)</p>
Signup and view all the answers

What is the key characteristic of newsgroups compared to other forms of online discussion forums?

<p>Newsgroups use a specialized newsreader program to access discussions. (C)</p>
Signup and view all the answers

What role does FTP play in the distribution of software and other large files over the Internet?

<p>FTP provides a standard method for transferring large files between computers. (D)</p>
Signup and view all the answers

What is the major benefit of using VoIP for phone calls?

<p>Lower costs for long-distance calls. (D)</p>
Signup and view all the answers

How does a 'plug-in' enhance the capabilities of a web browser?

<p>By adding specific programming for enhanced functionality. (C)</p>
Signup and view all the answers

What is the key difference between downloaded and streaming multimedia content?

<p>Downloaded content is fully stored on the user's device, while streaming content is played in real-time without complete storage. (D)</p>
Signup and view all the answers

How does push technology change end-users interaction with online content?

<p>Content can be automatically sent to the users. (B)</p>
Signup and view all the answers

What is the core purpose of RSS (Really Simple Syndication) newsreaders?

<p>To gather content from websites. (C)</p>
Signup and view all the answers

What is the main focus of blogs and weblogs?

<p>Allowing individuals and groups to broadcast data (D)</p>
Signup and view all the answers

Which of the following is an accurate description of showrooming?

<p>Customers going in retail store to research, then buying online. (A)</p>
Signup and view all the answers

What mainly defines the concept of Web 2.0?

<p>Social, collaborative, responsive web. (D)</p>
Signup and view all the answers

In the context of Web 3.0, what is semantic markup?

<p>Forms data which uses a system readable by machines. (A)</p>
Signup and view all the answers

Which of the following provides employees right to view workplace Emails?

<p>Corporate management gets to look at emails. (D)</p>
Signup and view all the answers

Why are unrequested emails considered wasteful?

<p>They take up time to look at. (D)</p>
Signup and view all the answers

What is the purpose of Phishing?

<p>Direct recipient to a fake website for personal data (D)</p>
Signup and view all the answers

Why does Pharming get malware on systems?

<p>Redirecting users to a webpage (Fake). (A)</p>
Signup and view all the answers

Cookies can be considered:

<p>First party or third party. (A)</p>
Signup and view all the answers

Spyware can result in:

<p>Software surreptitiously stealing the web. (C)</p>
Signup and view all the answers

What is the main reason to avoid easily-guessed characters?

<p>Make it hard for strangers to not learn passwords. (B)</p>
Signup and view all the answers

Flashcards

Bandwidth

An expression of how much data can be sent through a communications channel in a given amount of time.

Baseband

A slow type of internet connection that allows only one signal to be transmitted at a time.

Broadband

High-speed Internet connections.

Data Transmission Speeds

Originally measured in bits per second, it indicates the rate of data flow.

Signup and view all the flashcards

Upload

To transmit data from a local computer to a remote computer.

Signup and view all the flashcards

Download

To transmit data from a remote computer to a local computer.

Signup and view all the flashcards

Narrowband (Dial-Up Modem)

Low-speed, inexpensive Internet connection using a telephone line.

Signup and view all the flashcards

Dial-up connection

Using a telephone modem to connect to the internet.

Signup and view all the flashcards

DSL line

Use regular phone lines and a DSL modem.

Signup and view all the flashcards

Cable modem

TV cable system with Internet connection, company usually supplies cable modem.

Signup and view all the flashcards

Satellite Wireless Connections

Requires satellite dish and modem, transmits data between satellite and Earth.

Signup and view all the flashcards

Wi-Fi

Stands for wireless fidelity, set of wireless standards by IEEE.

Signup and view all the flashcards

Internet Service Provider (ISP)

Organization that provides access to the Internet for a fee.

Signup and view all the flashcards

The Internet

A huge network that connects millions of smaller networks.

Signup and view all the flashcards

Client

Computer requesting data or services.

Signup and view all the flashcards

Server

Central computer supplying data or services requested by client.

Signup and view all the flashcards

Point of Presence (POP)

A collection of modems and other equipment in a local area.

Signup and view all the flashcards

Internet Exchange Point (IXP)

Routing computer at a point on the Internet where several connections meet.

Signup and view all the flashcards

Internet Backbone

High-speed, high-capacity data transmission lines, usually fiber optic.

Signup and view all the flashcards

Internet 2

Cooperative university/business education and research project.

Signup and view all the flashcards

Protocols

The set of rules a computer follows to electronically transmit data.

Signup and view all the flashcards

TCP/IP

The Internet protocol.

Signup and view all the flashcards

Packets

Fixed-length blocks of data for transmission, determined by TCP/IP.

Signup and view all the flashcards

Uniform Resource Locator (URL)

Address for a web page.

Signup and view all the flashcards

HTTP

Protocol Used to Access World Wide Web

Signup and view all the flashcards

Hypertext Markup Language (HTML)

Markup language used in writing and publishing web pages.

Signup and view all the flashcards

Hypertext links

Connect one web document to another.

Signup and view all the flashcards

Web Portals

Starting points for finding information.

Signup and view all the flashcards

Search engines

Programs that users can use to ask questions or use keywords to find information

Signup and view all the flashcards

Wikipedia

A free online encyclopedia that anyone around the world can contribute to or edit

Signup and view all the flashcards

Push technology

Software that automatically downloads information to personal computers.

Signup and view all the flashcards

Blogs

Blogs (weblogs) are frequently updated sites on the web intended for public consumption that contain a writer's observations, opinions, images, and links to other websites

Signup and view all the flashcards

E-Commerce

Conducting business activities online.

Signup and view all the flashcards

Social Networking Sites

Online communities that allow members to keep track of friends and share photos, videos, music, stories, and ideas

Signup and view all the flashcards

Phishing

Sending forged email directing recipient to fake website.

Signup and view all the flashcards

Cookies

A small text file that websites store in your hard drive.

Signup and view all the flashcards

Spyware

Software surreptitiously installed on your computer via the web.

Signup and view all the flashcards

Adware

A kind of spyware that tracks web surfing or online buying so that marketers can send you targeted and unsolicited pop-up and other ads

Signup and view all the flashcards

Browser hijackers

change settings in your browser without your knowledge

Signup and view all the flashcards

Key Loggers

Record each character you type and transmit that information to someone else on the Internet

Signup and view all the flashcards

Malware

Malicious software that can harm a computer system

Signup and view all the flashcards

Study Notes

  • The Internet began in 1969 as ARPANET.
  • In the early 1990s, multimedia became available, and the World Wide Web was born.

Connecting to the Internet

  • To connect to the Internet, you need an access device (computer with a modem), a means of connection (phone line, cable hookup, or wireless), and an Internet access provider.
  • Bandwidth expresses how much data can be transmitted through a communications channel in a given amount of time.
  • Baseband is a slow connection that allows only one signal to be transmitted.
  • Broadband offers high-speed connections.
  • Physical Internet connections can be wired or wireless.
  • Wired options include telephone [dial-up] modem, high-speed phone line-DSL, T1/T3, and cable modem.
  • Wireless options include satellite and other through-the-air links.
  • Data transmission speed was originally measured in bits per second (bps).
  • 8 bits are needed to send one character.
  • Kbps connections send 1 thousand bits per second.
  • Mbps connections send 1 million bits per second.
  • Gbps connections send 1 billion bits per second.
  • Upload transmits data from local to a remote computer.
  • Download transmits data from a remote to a local computer.

Narrowband

  • Narrowband (Dial-Up Modem) offers low speed but is inexpensive
  • Telephone line equals narrowband, low bandwidth, or low speed.
  • Dial-up connection uses a telephone modem to connect to the Internet in rural areas on POTS (plain old telephone system).

Telephone Modems

  • Can be either internal or external.
  • The maximum speed is 56 Kbps.
  • Most ISPs offer local access numbers.

High-Speed Phone Lines

  • Costs more but is available in cities and most towns.

DSL line

  • Uses regular phone lines, DSL modem.
  • Receives data at 7–105Mbps and sends at about 384 Kbps - 1 Mbps.
  • Is always on.
  • Needs to live no farther than 4.5 miles from phone company switching office.
  • Not always available in rural areas.

T1 line

  • Traditional trunk line, fiber optic or copper; carries 24 normal telephone circuits.
  • The transmission rate is 1.5 – 6 Mbps (T3 = 6 – 47 Mbps).
  • The “last mile" can often still be a problem.
  • Generally used by large organizations.

Cable modem

  • A TV cable system with an Internet connection; the company usually supplies the cable modem.
  • Is always on.
  • Receives data at up to 100 Mbps and sends at about 2-8 Mbps.

Wireless type Wi-Fi

  • Stands for “wireless fidelity.”
  • Name for a set of wireless standards (802.11) set by IEEE
  • Transmits data wirelessly up to 54 Mbps for 300 – 500 feet from access point (hotspot)
  • Typically used with laptops and tablets that have Wi-Fi hardware

"G" Generations

  • 3G= third generation and uses existing cellphone system and handles voice, email, multimedia
  • 4G= "fourth generation", is faster than 3G, and built specifically for Internet traffic but not standard yet
  • Both 3G and 4G used mostly in smartphones

Internet Service Providers (ISPs)

  • ISP: Local, regional, or national organization that provides access to the Internet for a fee
  • Wireless Internet Service Provider (WISP) enables wireless-equipped laptop/tablet and smartphone users to access the Internet

How the Internet Works

  • The Internet is a huge network connecting hundreds of thousands of smaller networks.
  • Client/server networks are central to the arrangement.
  • Client: computer requesting data or services.
  • Server or host computer: central computer supplying data or services requested of it.

Point of Presence (POP)

  • A collection of modems and other equipment in a local area.
  • A local gateway (access) to an ISP's network
  • ISP connects to an IXP

Internet Exchange Point (IXP)

  • A routing computer where several connections come together.
  • IXPs are run by private companies.
  • Allow different ISPs to exchange Internet traffic.

Internet Backbone

  • High-speed, high-capacity data transmission lines, usually fiber optic
  • Uses the newest technology.
  • Providers include AT&T, Sprint, Verizon, CenturyLink, and Deutsche Telekom

Internet 2

  • Cooperative university/business education and research project.
  • Adds new "toll lanes” to the older Internet to speed things up.
  • Advances videoconferencing, research, and collaboration

Internet Communications

  • Connecting to your ISP's point of presence (POP) involves Handshaking & Authentication
  • Handshaking: fastest transmission speed established.
  • Authentication: correct password & user name.

Protocols

  • The set of rules a computer follows to electronically transmit data
  • TCP/IP (Transmission Control Protocol/Internet Protocol) is the Internet protocol
  • Developed in 1978 by ARPA and used for all Internet transactions

Packets

  • Fixed-length blocks of data for transmission, determined by TCP/IP
  • Data transmissions are broken up into packets and re-assembled at destination with the IP (Internet Protocol) address
  • Every device connected to the Internet has an address.
  • Each IP address uniquely identifies that device.
  • The address is four sets of numbers separated by periods (e.g., 1.160.10.240).
  • Each number is between 0 and 255
  • Dynamic IP addresses change with every use.
  • Static IP addresses don't change and are used by established organizations
  • The board of trustees of the Internet Society (ISOC) oversees the standards
  • Internet Corporation for Assigned Names and Numbers (ICANN) regulates domain names that underlie IP addresses, but does not control content

Browsers, Websites, & Web Pages

  • The web and the Internet are not the same.
  • The web is multimedia-based.
  • The Internet is the infrastructure that supports the web.
  • A browser is software that gets you to websites and their individual web pages.
  • The content appears the same regardless of the computer, operating system, and display monitor.
  • A website is the location on a particular computer (server) that has a unique address
  • It could be anywhere, not necessarily at company headquarters
  • A web page is a document on the web that can include text, pictures, sound, and video.
  • The first page on a website is the Home page
  • It contains links to other pages on the website and other websites
  • Uniform Resource Locator (URL): address for a web page.
  • A character string that points to a specific piece of information anywhere on the web
  • A web sites unique address
  • Consists of the web protocol, http://, the domain name of the web server, the directory name or folder, and the file including extension within that directory
  • TCP/IP- As explained (p. 60), general Internet Protocol
  • HTTP-Protocol Used to Access World Wide Web
  • Hypertext Markup Language (HTML) is the "markup" language used in writing and publishing web pages
  • HTML consists of a set of instructions used to specify document structure, formatting, and links to other documents on the web.
  • Hypertext links connect one web document to another
  • Web browsers interpret HTML and allow you to move around the Internet and the web
  • Comes preinstalled on most PCs, but you can download others

Basic Elements of Web Browsers

  • URL (address) bar
  • Menu bar
  • Toolbar
  • Workspace
  • Status bar
  • The page you see when you open your web browser is the Home Page
  • You can change the Home Page on your browser
  • Use the browser's icons to move from one page to another, and can appear on different bars in different browsers
  • History List
  • A list of websites you visited since you opened up your browser for this session
  • Allows you to easily return to a particular site
  • Bookmark
  • Allows you to store the URL from a site on your computer so you can find it again in another browser session
  • To save the URL for a site, click on “Favorites” in Internet Explorer, “Bookmarks" in Mozilla Firefox, or the star icon in the URL address bar in Chrome

Interactivity on a Web Page

  • Can click on hyperlinks to transfer to another page
  • Click on a radio button to choose an option
  • Type text in a text box and then hit Enter
  • Click on scroll arrows to move up and down, or side to side, on a page
  • Click on different frames for separate controllable sections

Web portals

  • Starting points for finding information.
  • A gateway website that offers resources and services, online shopping malls, email support, community forums, stock quotes, travel info, and to other categories.
  • Examples: Yahoo!, Google, Bing, Lycos, and AOL
  • Many require that you log in.
  • You can then check the Home page for general information, use the subject guide to find a topic you want, or use a keyword to search for a topic

Search Services & Search Engines

  • They help you find information on the internet
  • Examples: portals like Yahoo! and Bing, plus Google, Ask.com, Gigablast
  • Search services maintain search engines-programs that users can use to ask questions or use keywords to find information
  • The databases of search engines are compiled using software programs called spiders (crawler, bots, agents) which crawl through the World Wide Web, follow links, and index the words on that site.
  • A search never covers the entire web
  • Search engines differ in what they cover

Web Search Tool Types

  • Individual Search Engines
  • Compile their own searchable databases on the web
  • You search by typing keywords and receiving “hits”
  • Examples are Ask, Bing, Google, and Yahoo!
  • Subject Directories
  • Created and maintained by human editors, not electronic spiders
  • Allow you to search for information by selecting lists of categories or topics
  • Example sites are Beaucoup!, LookSmart, Open Directory Project, and Yahoo! Directory
  • Metasearch Engines
  • Allows you to search several search engines simultaneously
  • Examples are Yippy!, Dogpile, Mamma, MetaCrawler, and Webcrawler
  • Specialized Search Engines
  • Help locate specialized subject matter, such as info on movies, health, jobs
  • Examples are Career.com. WebMD, Expedia, U.S. Census Bureau

Smart Searching - Strategies

  • Browsing : Try a subject directory and then a metasearch engine
  • Specific information : Try a Answers.com “one-click" search, or go to a general search engine, then a specialized one
  • Looking for everything : Try the same search on several search engines

Wiki

  • A simple piece of software that can be downloaded for free and used to make a website that can be corrected or added to by anyone
  • Wikipedia is a free online encyclopedia that anyone around the world can contribute to or edit
  • It has more than 25 million articles in more than 285 languages; over 4.1 million articles appear in the English Wikipedia alone
  • Wikipedia is not considered reliable or authoritative by Many academics and librarians

Multimedia Search Tools

  • Still images e.g., Google Image Search, Bing Images, Fagan Finder
  • Audio e.g., Yahoo! Music, Lycos MP3 Search
  • Video e.g., AlltheWeb, AOL.video
  • Scholarly e.g., Google Scholar

Tagging

  • Do-it-yourself labels that people can put on anything found on the Internet to find their favorite sites again and to link them.
  • Can be shared easily with other people
  • Tags are commonly used on blogs and YouTube and are words listed at the bottom
  • Essentially tags are keywords used to classify content. (The # is a hash symbol; thus the Twitter term hashtag.) Tag managing is available through delicious.com and BlinkList, among other companies

Email

  • Outgoing mail is sent from your computer to a Simple Mail Transfer Protocol (SMTP) server run by your ISP

  • Incoming mail uses Post Office Protocol version 3 (POP3).

  • There are two ways to send & receive email:

  • Email Program: Enables you to send email email software that interacts with an email server; Incoming mail is stored on the server in an electronic mailbox

  • Upon access (your ID and password), mail is sent to your software's inbox

  • Examples: Microsoft Outlook, Apple Mail

  • Web-Based Email

  • You send and receive messages by interacting via a browser with a website

  • Advantage: You can easily send and receive messages while traveling by using any computer or equipped mobile device and Yahoo! Mail and Gmail (Google)

  • Disadvantages: Ads and email hacking

  • Get an email address from your ISP, following this format; User name (User ID)@Domain name.Country

Tips for Using Email

  • Use the address-book feature to store email addresses
  • Use folders to organize email
  • Be careful with attachments
  • Be aware of email netiquette

Email Attachments:

  • Send a copy of a file or document attached to an email
  • Recipients must have compatible software to open the attachment in the email
  • Be careful when opening attachments to avoid viruses
  • Check or scan them with antivirus software.
  • Know who has sent the attachments before open them.

Netiquette

  • Rules for appropriate Online Behavior:
  • Don't waste people's time.
  • Don't write anything that you would not say to a person's face.
  • Include helpful subject and signature lines.
  • Be clear and concise.
  • Avoid spelling and grammatical errors.
  • Avoid SHOUTING and flaming.
  • Be careful with jokes.
  • Avoid sloppiness.
  • Don't send huge file attachments unless requested.
  • Quote only the relevant portion when replying to email
  • Don't overforward (don't copy emails to everyone you know).

Instant Messaging

  • Enables communication via email with specified other users (“buddies”) in real time
  • Users on a given email system can send a message
  • The recipient sees a pop up instantly on the screen
  • Get IM by downloading IM software from a supplier
  • Examples: AOL/AIM, Google Chat, Windows Messenger, Yahoo! Messenger
  • Done on computers andnot by Texting

Discussion Groups

  • Mailing Lists: One-way or two-way email subscription lists
  • Email discussion groups on special-interest topics, in which all subscribers receive email messages sent to the group's email address
  • Newsgroups: Giant electronic bulletin board where users can participate with a newsreader program
  • Message Boards: Similar to newgroups without the newsreader
  • A collection of messages on a particular topic is called a thread

FTP

  • Used for transferring large files between computers that have different operating systems
  • Transfer files from an FTP site to your PC using your web browser or FTP downloads some examples include-Fetch, Cute, FileZilla, and SmartFTP

Telephony

  • Involves Using the Internet to make phone calls via VoIP (Voice over Internet Protocol), thus resulting in either very inexpensive or free long-distance calls. Use a PC having a sound card, microphone, Internet connection with modem & ISP, and internet telephone software or phone such as Skype and Vonage in Addition you have the use of videoconferencing, as well

Multimedia on the Web

  • Allows to get images, sound, video, and animation
  • Requires plug-in, player, or a viewer- a downloadable program Examples- Flash, RealPlayer, QuickTime

multimedia Applets

  • Small programs and Can be quickly downloaded, and used by most browsers. Java is the most common Applet language and Text & Images-great variety available, look at google earth as an example Animation = the rapid sequencing of still images to create the appearance of motion. Used in video games and web images for banners Video & Audio can be downloaded completely for playing

Webcasting

  • Sending customized text, video, audio on regular basis RSS newsreaders or (RSS aggregators); scour the web, pull feeds together XMLbased, or extensible markup language web and tagging the use of HTML can exchange data Blogs are weblogs -frequently updated sites on the web for public consumption and Images Podcasting delivers audio through RSS feeds for digital playback and streaming

E-Commerce

  • Is Electronic commerce like B2B and B2B or C2C
  • Showrooming in which shoppers check items to purchase online on rival webistes at a lower price • Business-to-business e-commerce • Business-to-consumer commerce • Consumer-to-consumer commerce

Web 2.0

  • The shift, that leads to the social web, is
  • Social networking sites: Online communities that allow members to share and share information
  • Media-sharing sites: Online social networks media such as photos, videos, music, ideas
  • Social-network aggregators: Content collected from multiple sources and tracked

Computer generated Web.30

  • Information will be computer-generated- semantic markup is essential.
  • Browser acts like a personal assistant because people have unique browsing histories

Security Threats

  • Snooping or Email isnt private. Corporate can manage who sees it then it is also availavle everywhere.
  • Spam/ Electronic Junk Mail/ Unsolicited Email. Report Spam so people do not receive message to reduce the volume on your machine. Do not click messages
  • Spoofing sending fake so they are trusted. Phishing sending fake data to entice people into scams Pharming - Implants malicious software by downloading. Some removal programs are available

Other threats

Adware =spyware. and pop ups-unsolicited to track movements Browswer Hijackers- changing settings Search hijackers and key stalkers can cause your information to be visible. Malware is used as harm and install antiviral softeware

Defend your systems

  • Get virus software programs by McAfee, Norton, etc and scan. Back up your device
  • Password rules DO not write anything down or copy it as people will find this. make the password to difficult to memorise, do not use a real word

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser