Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)
Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)
1st Edition
ISBN: 9781305657458
Author: Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher: Cengage Learning
Question
Book Icon
Chapter 9, Problem 1CTQ
Program Plan Intro

Operating System (OS):

  • OS is the term that acts as an interface between the hardware and the user.
  • OS does basic operations such as getting input from the keyboard, displaying output in the monitor and monitoring the files.

Windows OS tools:

  • Firewall
    • It monitors and controls the traffic on network in the system.
    • It acts as a barrier between the system and unauthorized users.
  • Antivirus software
    • It is used for identifying, preventing and deleting the errors in the system.
  • Spyware
    • It helps the unauthorized users like hacker to get access to the system.
  • Malware detection software
    • It is used for identifying, preventing and deleting the malware present in the system.
  • Automatic updating
    • It helps in updating the software without including the user permission.

Explanation of Solution

Security concerns related to built-in OS tools:

Yes” the built-in OS tools include the security concerns.

Reason:

Window...

Explanation of Solution

Alternatives:

  • Encryption
    • Encryption is the term used to define the process which helps protect the unauthorized access to data.
    • The data is hidden using some mathematical algorithms.
    • It helps to protect data during transmission of data over a network and the data stored in databases are protected.
  • Authentication
    • Authentication sequence or digital signatures are used in securing many financial transactions...

Explanation of Solution

Disability of Windows tool:

Yes”, the Windows tool must be disabled in terms of risk.

Reason:

  • The unauthorized access can be avoided by disabling the Windows tool...

Blurred answer
Students have asked these similar questions
Unable to Configure Windows Update You have recently hired a server administrator to help maintain your servers and desktops in your Windows domain. She was working with a desktop computer and found that she couldn’t configure Windows Update. Write a memo explaining why she was unable to configure Windows Update and point out four advantages of using WSUS.
A security flaw has been discovered in server software that is critical to your organization. A patch is available from the vendor. What should you do next?   a. Stop using the software.     b. Turn off the server.     c. Disconnect all users and update the software immediately.     d. Update the software during non-business hours.     Susan has recently noticed pop-up advertisements on her work computer while using a particular browser. What would be the most comprehensive tool that a desktop technician could suggest to protect her computer?   a. Install antimalware software.     b. Use a different browser.     c. Install antivirus software.     d. Enable the pop-up blocker in the browser.
I need help with the first Response to a Computer Incident 1. You are responding with others to the scene of a computer incident. You are theone responsible for the computers at the scene. The target system (only one) is ina business. The screen is locked, with the operating system logo displayed as Windows2008 Server. The prompt explains that the computer is locked and that onlythe administrator can unlock it. The system administrator is available and is not thetarget of the investigation, and she is considered a person with high integrity who iswilling to assist.2. tell in detail how you would take down this machine and take it to the lab forimaging if the Enterprise, FIM 6, Portable, or EnCase 7 version is not an option and ifyour directive is to seize it and take it to the lab.3. Jot down your narrative as though it were going to be included in your report. Be sureto describe your shutdown methodology and reasoning. Include details sufficient toestablish the complete chain of…

Chapter 9 Solutions

Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)

Ch. 9 - Prob. 11SGCh. 9 - Prob. 12SGCh. 9 - Prob. 13SGCh. 9 - Prob. 14SGCh. 9 - Prob. 15SGCh. 9 - Prob. 16SGCh. 9 - Prob. 17SGCh. 9 - Prob. 18SGCh. 9 - Prob. 19SGCh. 9 - Prob. 20SGCh. 9 - Prob. 21SGCh. 9 - Prob. 22SGCh. 9 - Prob. 23SGCh. 9 - Prob. 24SGCh. 9 - Prob. 25SGCh. 9 - Prob. 26SGCh. 9 - Prob. 27SGCh. 9 - Prob. 28SGCh. 9 - Prob. 29SGCh. 9 - Prob. 30SGCh. 9 - Prob. 31SGCh. 9 - Prob. 32SGCh. 9 - Prob. 33SGCh. 9 - Prob. 34SGCh. 9 - Prob. 35SGCh. 9 - Prob. 36SGCh. 9 - Prob. 37SGCh. 9 - Prob. 38SGCh. 9 - Prob. 39SGCh. 9 - Prob. 40SGCh. 9 - Prob. 41SGCh. 9 - Prob. 42SGCh. 9 - Prob. 43SGCh. 9 - Prob. 44SGCh. 9 - Prob. 45SGCh. 9 - Prob. 46SGCh. 9 - Prob. 47SGCh. 9 - Prob. 48SGCh. 9 - Prob. 49SGCh. 9 - Prob. 1TFCh. 9 - Prob. 2TFCh. 9 - Prob. 3TFCh. 9 - Most users today work with a command-line...Ch. 9 - Prob. 5TFCh. 9 - Prob. 6TFCh. 9 - Prob. 7TFCh. 9 - Prob. 8TFCh. 9 - Many of the first operating systems were device...Ch. 9 - Prob. 10TFCh. 9 - Prob. 11TFCh. 9 - Prob. 12TFCh. 9 - Prob. 1MCCh. 9 - Prob. 2MCCh. 9 - Prob. 3MCCh. 9 - A _____operating system allows two or more...Ch. 9 - Prob. 5MCCh. 9 - Prob. 6MCCh. 9 - Prob. 7MCCh. 9 - Prob. 8MCCh. 9 - firmware a. operating system problem that occurs...Ch. 9 - Prob. 2MCh. 9 - thrashing a. operating system problem that occurs...Ch. 9 - Prob. 4MCh. 9 - drive a. operating system problem that occurs when...Ch. 9 - Prob. 6MCh. 9 - Prob. 7MCh. 9 - Prob. 8MCh. 9 - icons a. operating system problem that occurs when...Ch. 9 - Prob. 10MCh. 9 - Prob. 2CTCh. 9 - Prob. 3CTCh. 9 - Prob. 4CTCh. 9 - What is a cross-platform application?Ch. 9 - Prob. 6CTCh. 9 - Prob. 7CTCh. 9 - Prob. 8CTCh. 9 - Prob. 9CTCh. 9 - Prob. 10CTCh. 9 - Prob. 11CTCh. 9 - Prob. 12CTCh. 9 - Prob. 13CTCh. 9 - Prob. 14CTCh. 9 - Prob. 15CTCh. 9 - Prob. 16CTCh. 9 - Prob. 17CTCh. 9 - Prob. 18CTCh. 9 - Prob. 19CTCh. 9 - Prob. 20CTCh. 9 - Prob. 21CTCh. 9 - Prob. 22CTCh. 9 - Prob. 23CTCh. 9 - Prob. 24CTCh. 9 - Prob. 25CTCh. 9 - Prob. 26CTCh. 9 - Prob. 27CTCh. 9 - Prob. 28CTCh. 9 - Prob. 29CTCh. 9 - Prob. 1PSCh. 9 - Prob. 2PSCh. 9 - Prob. 3PSCh. 9 - Prob. 4PSCh. 9 - Prob. 5PSCh. 9 - Prob. 6PSCh. 9 - Prob. 7PSCh. 9 - Prob. 8PSCh. 9 - Prob. 9PSCh. 9 - Prob. 10PSCh. 9 - Prob. 11PSCh. 9 - Prob. 1.1ECh. 9 - Prob. 1.2ECh. 9 - Prob. 1.3ECh. 9 - Prob. 2.1ECh. 9 - Prob. 2.2ECh. 9 - Prob. 2.3ECh. 9 - Prob. 3.1ECh. 9 - Prob. 3.2ECh. 9 - Prob. 3.3ECh. 9 - Prob. 4.1ECh. 9 - Prob. 4.2ECh. 9 - Prob. 4.3ECh. 9 - Prob. 5.1ECh. 9 - Prob. 5.2ECh. 9 - Prob. 5.3ECh. 9 - Prob. 1IRCh. 9 - Prob. 2IRCh. 9 - Prob. 3IRCh. 9 - Prob. 4IRCh. 9 - Prob. 5IRCh. 9 - Prob. 1CTQCh. 9 - Prob. 2CTQCh. 9 - Prob. 4CTQ
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Text book image
Microsoft Windows 10 Comprehensive 2019
Computer Science
ISBN:9780357392607
Author:FREUND
Publisher:Cengage