Professional Documents
Culture Documents
MODULE 3 IN
IN IT
SUBMITTED TO: MR. DOMINIC R. JARA
SUBMITTED BY: MIKE ANGELO DUQUE
Engage
Your computer is at risk! It's all over the news. We hear it every day, but
what does that mean? How will you protect and secure your computer? How will
you protect your data and information that are currently saved on your
computer storage?
-The meaning of spreading news. we must take care of our computers to make
them safe. And this is how i protect my computer. I Access to all equipment,
wireless networks and sensitive data should be guarded with unique user names
document containing all user passcodes, be sure to encrypt it with its own
-Remove the file that has a virus because. a quarantined file isn't deleted.
It shows signs of infection, but by being in quarantine, the file has no
opportunity to infect your computer. It's safe. If the file can be fixed and
the infection eliminated, the file can be removed from quarantine and put
back into service.
-If you get this message, this means that your product key was purchased in a
different country or region than where you're currently located.
-If you get this message, this means that your product key was purchased in a
different country or region than where you're currently located.
3. You are writing a research paper for your history class and have found a
photo on the Web that you would like to use. You are cautious about using
photos on the Web because of copyright issues and photos that have been
altered digitally. How might you verify the validity of a photo on the Web?
EVALUATE: WORKSHEET 6
1.What Are Various Internet and Network Attacks, and How Can Users Safeguard
against These Attacks?
The techniques to Prevent Unauthorized Access and Use are Install all Security
Patches, Browsing the Internet? Pay Due Attention to File Sharing,
Keep the Firewall On, Carefully Read Your Email messages and Know the Senders,
Maintain a Proper Backup of Your Data Online, Make Use of Strong Passwords.
There are many simple steps to protect against hardware theft. Use physical
access controls to your hardware such as locked doors and windows. Use cables
to lock your equipment to a table, desk, or floor. Never leave a notebook
computer or mobile device unattended in a public place
1. B 5.C
2. D 6.C
3.B 7.D
4.B 8.C
ENGAGE
EXPLORE
As you reflect on the engage statement, I want you to answer the following.