5. Considering any Microsoft Windows operating system: of the following features in MS Windows: (i) C drive (ii) Desktop (iii) Recycle Bin a) Describe the significance

A+ Guide To It Technical Support
10th Edition
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:ANDREWS, Jean.
Chapter5: Supporting Hard Drives And Other Storage Devices
Section: Chapter Questions
Problem 8TC
icon
Related questions
Question
(x).
It is a good practice to read from the slides during presentation and to have around three clear bullet
points on it.
5. Considering any Microsoft Windows operating system:
a) Describe the significance of the following features in MS Windows: (i) C drive (ii) Desktop (iii) Recycle Bin
b) Write the long form for each of the following abbreviation related to IT security: HTTPS, 2FA, SSL, SSH, GIGO.
c) Attempt the following TRUE/FALSE questions related to computer security:
Internet is a secured place.
(i).
(ii).
(i).
(iv).
Passwords sent through Internet can be intercepted.
Websites with "http" are more secured than website with "https".
Password is a passphrase when it uses more than one word and is a passcode or passkey when it
uses only numbers.
(v).
A good password has minimum of eight characters.
(vi).
It is a good security practice to reuse password.
(vii). Single password can be used to login to several systems.
(viii).
A password of "123456" is among the password blacklist.
(ix).
(xi).
(xii).
Trojan horses replicate and are autonomous.
Hoax is a false message being spread by e-mail in order to deceive users.
For a malicious software to work, it must be installed in the computer.
Malicious software cannot install if your login account does not have installation privilege.
(xiii). Violating privacy is one of cybercrimes.
6. Answer the following questions related to network technologies and Internet application:
a) Write the long form for each of the following abbreviations: USSD, MOODLE, HTTPS, HTML, HTTP, URL, ISP,
TCP Wi-Fi, FTP.
b)
Mention one example for each of the following: (a) free mail server (b) search engine (c) cloud service (d) social
network (e) email feature (f) Internet service
c) Answer the following TRUE/FALSE questions related to Internet:
(i).
Internet is WLAN and is based on client-server architecture.
(ii).
Trash is a standard folder in any mail server.
(iii).
Spam emails do not have their addresses recorded in the mail address book.
(iv).
You can attach file of any size and any type in the email.
(v).
Your email address is unique in the world.
(vi). Instant messaging is a real time communication and allows textual communication, video conferencing,
and file transfer.
(vii). VoIP transfers sound over the Internet.
(viii).
Podcast contains audio or video content and is distributed over the Internet using RSS technology.
Instant messaging requires software installation while chatroom does not.
Transcribed Image Text:(x). It is a good practice to read from the slides during presentation and to have around three clear bullet points on it. 5. Considering any Microsoft Windows operating system: a) Describe the significance of the following features in MS Windows: (i) C drive (ii) Desktop (iii) Recycle Bin b) Write the long form for each of the following abbreviation related to IT security: HTTPS, 2FA, SSL, SSH, GIGO. c) Attempt the following TRUE/FALSE questions related to computer security: Internet is a secured place. (i). (ii). (i). (iv). Passwords sent through Internet can be intercepted. Websites with "http" are more secured than website with "https". Password is a passphrase when it uses more than one word and is a passcode or passkey when it uses only numbers. (v). A good password has minimum of eight characters. (vi). It is a good security practice to reuse password. (vii). Single password can be used to login to several systems. (viii). A password of "123456" is among the password blacklist. (ix). (xi). (xii). Trojan horses replicate and are autonomous. Hoax is a false message being spread by e-mail in order to deceive users. For a malicious software to work, it must be installed in the computer. Malicious software cannot install if your login account does not have installation privilege. (xiii). Violating privacy is one of cybercrimes. 6. Answer the following questions related to network technologies and Internet application: a) Write the long form for each of the following abbreviations: USSD, MOODLE, HTTPS, HTML, HTTP, URL, ISP, TCP Wi-Fi, FTP. b) Mention one example for each of the following: (a) free mail server (b) search engine (c) cloud service (d) social network (e) email feature (f) Internet service c) Answer the following TRUE/FALSE questions related to Internet: (i). Internet is WLAN and is based on client-server architecture. (ii). Trash is a standard folder in any mail server. (iii). Spam emails do not have their addresses recorded in the mail address book. (iv). You can attach file of any size and any type in the email. (v). Your email address is unique in the world. (vi). Instant messaging is a real time communication and allows textual communication, video conferencing, and file transfer. (vii). VoIP transfers sound over the Internet. (viii). Podcast contains audio or video content and is distributed over the Internet using RSS technology. Instant messaging requires software installation while chatroom does not.
Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Embedded software development
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
A+ Guide To It Technical Support
A+ Guide To It Technical Support
Computer Science
ISBN:
9780357108291
Author:
ANDREWS, Jean.
Publisher:
Cengage,