Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)
1st Edition
ISBN: 9781305657458
Author: Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 4, Problem 1M
Program Description Answer
“Tools” allow the users to perform tasks with respect to maintenance which is related to managing devices,
Therefore, the correct option is “D”.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
135.
Which one of the following would be considered as a way that a computer virus can enter a computer system?
a) Opening an application previously installed on the computer
b) Borrowed copies of software
c) Viewing a website without causing any additional transactions
d) Running antivirus programs
Enterprise Virus Protection: You are the new system administrator for Precision Accounting Services, which has 45 computers on its network running Windows Defender Antivirus. All the computers have access to the Internet and update antivirus definitions as required.
Last week, several users received an email with a link to an executable file stored on a cloud-based file sharing service. One user was tricked into downloading and running the malware. This malware was detected by Windows Defender Antivirus, but it could not be removed from memory while running. The user did not understand the malware detection messages and did not inform you.
This created a security risk because the malware ran for an extended period and began accessing network file shares. How can you prevent this in the future?
Describe the preventative maintenance that you can perform on a computer’s operating systems software. Use any evidence that you have collected in the lab to illustrate these.
Use Antivirus software … can also be scheduled in this way as a preventative measure. Software Update, Driver Update (steps include screen shots)
No plagiarism please. Thanks
Chapter 4 Solutions
Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)
Ch. 4 - Prob. 1SGCh. 4 - Prob. 2SGCh. 4 - Prob. 3SGCh. 4 - Prob. 4SGCh. 4 - _____ software performs functions specific to a...Ch. 4 - Prob. 6SGCh. 4 - List any restrictions for shareware, freeware,...Ch. 4 - Prob. 8SGCh. 4 - Prob. 9SGCh. 4 - Prob. 10SG
Ch. 4 - Prob. 11SGCh. 4 - Prob. 12SGCh. 4 - Prob. 13SGCh. 4 - Prob. 14SGCh. 4 - Prob. 15SGCh. 4 - Prob. 16SGCh. 4 - Prob. 17SGCh. 4 - Prob. 18SGCh. 4 - Prob. 19SGCh. 4 - Prob. 20SGCh. 4 - Prob. 21SGCh. 4 - Prob. 22SGCh. 4 - Prob. 23SGCh. 4 - Prob. 24SGCh. 4 - Prob. 25SGCh. 4 - Prob. 26SGCh. 4 - Prob. 27SGCh. 4 - Prob. 28SGCh. 4 - Prob. 29SGCh. 4 - Prob. 30SGCh. 4 - Prob. 31SGCh. 4 - Prob. 32SGCh. 4 - Prob. 34SGCh. 4 - Prob. 35SGCh. 4 - Prob. 36SGCh. 4 - Prob. 37SGCh. 4 - Prob. 38SGCh. 4 - Prob. 39SGCh. 4 - Prob. 40SGCh. 4 - Prob. 41SGCh. 4 - Prob. 42SGCh. 4 - Prob. 43SGCh. 4 - Prob. 44SGCh. 4 - Prob. 45SGCh. 4 - Prob. 46SGCh. 4 - Prob. 47SGCh. 4 - Prob. 48SGCh. 4 - Prob. 49SGCh. 4 - Prob. 1TFCh. 4 - Prob. 2TFCh. 4 - Prob. 3TFCh. 4 - Prob. 4TFCh. 4 - Prob. 5TFCh. 4 - Prob. 6TFCh. 4 - Prob. 7TFCh. 4 - Prob. 8TFCh. 4 - Prob. 9TFCh. 4 - Prob. 10TFCh. 4 - Prob. 11TFCh. 4 - Prob. 12TFCh. 4 - Prob. 1MCCh. 4 - Prob. 2MCCh. 4 - Prob. 3MCCh. 4 - Prob. 4MCCh. 4 - Prob. 5MCCh. 4 - Prob. 6MCCh. 4 - Prob. 7MCCh. 4 - Prob. 8MCCh. 4 - Prob. 1MCh. 4 - Prob. 2MCh. 4 - Prob. 3MCh. 4 - Prob. 4MCh. 4 - Prob. 5MCh. 4 - Prob. 6MCh. 4 - Prob. 7MCh. 4 - Prob. 8MCh. 4 - Prob. 9MCh. 4 - Prob. 10MCh. 4 - Prob. 2CTCh. 4 - Prob. 3CTCh. 4 - Prob. 4CTCh. 4 - Prob. 5CTCh. 4 - Prob. 6CTCh. 4 - Prob. 7CTCh. 4 - Prob. 8CTCh. 4 - Prob. 9CTCh. 4 - Prob. 10CTCh. 4 - Prob. 11CTCh. 4 - Prob. 12CTCh. 4 - Prob. 13CTCh. 4 - Prob. 14CTCh. 4 - Prob. 15CTCh. 4 - Prob. 16CTCh. 4 - Prob. 17CTCh. 4 - Prob. 18CTCh. 4 - Prob. 19CTCh. 4 - Prob. 20CTCh. 4 - Prob. 21CTCh. 4 - Prob. 22CTCh. 4 - Prob. 23CTCh. 4 - Prob. 24CTCh. 4 - Prob. 25CTCh. 4 - Prob. 26CTCh. 4 - Prob. 27CTCh. 4 - Prob. 28CTCh. 4 - Prob. 29CTCh. 4 - Prob. 30CTCh. 4 - Prob. 1PSCh. 4 - Prob. 2PSCh. 4 - Prob. 3PSCh. 4 - Prob. 4PSCh. 4 - Prob. 5PSCh. 4 - Prob. 6PSCh. 4 - Prob. 7PSCh. 4 - Prob. 8PSCh. 4 - Prob. 9PSCh. 4 - Prob. 10PSCh. 4 - Prob. 1.1ECh. 4 - Prob. 1.2ECh. 4 - Prob. 1.3ECh. 4 - Prob. 2.1ECh. 4 - Prob. 2.2ECh. 4 - Prob. 2.3ECh. 4 - Prob. 3.1ECh. 4 - Prob. 3.2ECh. 4 - Prob. 3.3ECh. 4 - Prob. 4.1ECh. 4 - Prob. 4.2ECh. 4 - Prob. 4.3ECh. 4 - Prob. 5.1ECh. 4 - Prob. 5.2ECh. 4 - Prob. 5.3ECh. 4 - Prob. 1IRCh. 4 - Prob. 2IRCh. 4 - Prob. 4IRCh. 4 - Prob. 2CTQ
Knowledge Booster
Similar questions
- Name and describe 2 examples of malware and its categories. for each malware, explain: i. What is the dangerous thing that the malware does so that it is giventhat category. ii. Examples of real cases and references to such cases.arrow_forwardAntivirus is a kind of software used to prevent, scan, detect and delete viruses from a computer. Once installed, most antivirus software runs automatically in the background to provide real-time protection against virus attacks.Comprehensive virus protection programs help protect your files and hardware from malware such as worms, Trojan horses and spyware, and may also offer additional protection such as customizable firewalls and website blocking. On same background explain how does an Antivirus system in a computer function.arrow_forward(b) There are many types of malware programs which could harm your computer such as worms, Trojans and viruses. Discuss any FOUR (4) methods could be used to protect your computer from being hacked or infected by these malware programs.arrow_forward
- Determine a solution to the problems in these exercises by a discussion: 1. Slow Computer Performance: Your computer is running exceptionally slow. Not only does it take the operating system a long time to start, but programs also are not performing as well as they used to perform. How might you resolve this? 2 . Potential Virus Infection: While using your laptop, a message is displayed stating that your computer is infected with a virus and you should tap or click a link to download a program designed to remove the virus. How will you respond? 3.Excessive Phone Heat While using your smartphone, you notice that throughout the day it gets extremely hot, making it difficult to hold up to your ear. What steps can you take to correct this problem?arrow_forwardQuestion selecting any free antivirus Compare an additional Free Malware product with windows defender expain the difference between the productarrow_forwardSafe Guarding Your Devices (a) Think about how you keep your computer, tablet, or smartphone safe against unwanted intruders. (b) In a previous chapter, two principal methods were discussed —antivirus software and password protection. (c) Two more technical methods introduced in this chapter are biometric authentication and encryption. (d) Pretend you own a small business where all your business records are stored in electronic devices that could include a computer, a tablet, and a smart phone. (e) Identify how you would protect the contents of your electronic devices used for your business. (f) Discuss what software and/or hardware you would purchase and install on your devices to protect them. (g) Also identify at least one application of how you would use either biometric authentication and/or encryption for your employees to use to gain access to your business’s data. (h) Every person in the class must present their own unique use of these tools so there should be no duplicates…arrow_forward
- You and your friend frequently play a popular online role-playing game during office hours. Yours friend’s computer had a virus recently, which was traced back to a malware-infected website.Your friend tells you that several software in her computer suddenly crashed after visiting the website using a link while playing the game. Explain 3 (three) risks involved and measures taken to overcome this problem.arrow_forwardWhat is the TrapDoor virus? - introduction ( what is it about , who created, when started ) - summary ( details about the virus , nature of virus; how can it effect ) - how to safeguard against the TrapDoor virus??arrow_forward3. Malware refers to harmful software that disrupts or manipulates an electronic device's normal operation. View the latest malware threats from https://any.run/malware-trends/. a) Select and analyze any TWO (2) of the recent malware threats. b) How does malware workarrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning