FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
You are using a public computer in the lobby of a hotel. What is something that you should be aware of while using this computer?
A
Public computers are usually safe to use because they run the latest security software.
B
There may be malware on the computer that is capturing any personal information you enter on it, such as user names and passwords.
C
There may be malware on the computer that could damage any file you use on it, but that poses no threat to your personal information.
D
You will be prevented from accessing any site that would require you to enter personal information.
Explanation: 

Detailed explanation-1: -What is something that you should be aware of while using this computer? Public computers are usually safe to use because they run the latest security software. There may be malware on the computer that is capturing any personal information you enter on it, such as user names and passwords.

Detailed explanation-2: -Spyware is a type of program that is installed with or without your permission on your personal computers to collect information about users, their computer or browsing habits tracks each and everything that you do without your knowledge and send it to remote user.

Detailed explanation-3: -A buffer overflow (or buffer overrun) occurs when the volume of data exceeds the storage capacity of the memory buffer. As a result, the program attempting to write the data to the buffer overwrites adjacent memory locations.

Detailed explanation-4: -Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. Online threats and mean, aggressive, or rude texts, tweets, posts, or messages all count. So does posting personal information, pictures, or videos designed to hurt or embarrass someone else.

Detailed explanation-5: -What is one thing that James can do to be sure he is practicing cyber-safety? He should never disclose personal information.

There is 1 question to complete.