TECHNOLOGYS ETHICAL LEGAL PRIVACY ISSUES
INFORMATION PRIVACY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Set the macro security in programs so you can enable or disable macros
|
|
Install an antivirus program on all of your computers
|
|
Uses information to detect if virus tampers with file
|
|
Never open an e-mail attachment unless you are expecting it and it is from a trusted source
|
Detailed explanation-1: -Never download or install software from a source you don’t trust completely. Never open an attachment or run a program sent to you in an email from someone you don’t know. Keep all software on your computer up to date with the latest patches. Make sure a Trojan antivirus is installed and running on your computer.
Detailed explanation-2: -Antivirus is a kind of software used to prevent, scan, detect and delete viruses from a computer.
Detailed explanation-3: -A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. A Trojan acts like a bona fide application or file to trick you.