Best Utilities for Your Computer Introduction

Yüklə 16.86 Kb.
ölçüsü16.86 Kb.
Best Utilities for Your Computer
Introduction: The Internet is a two-way stream of communication, and everyone online is vulnerable to unwanted intrusions into their computer. Some intrusions are simply annoying, such as pop-up advertising, but others can be invasive or destructive, such as those that track your activities, read information from your hard drive, or use your computer to run destructive programs.
Discover the dangers existing online and what measures you can take to protect your computer against hackers, spyware, unwanted advertising, and other hazards of surfing the net.

Preview Video
Complete the quiz by highlighting/bolding the correct answer. Complete ONE Project. Upload it to your instructor.

  1. One of the sites the Sound Byte recommends to download utilities for your computer is:





  1. Sponsored downloads are:

    1. software recommended by the download site host.

    2. software recommended by other users of the site.

    3. software provided by providers who paid a fee to the download site.

    4. software provided by major software developers.

  1. Which of the following statements about pop-ups is FALSE?

    1. All pop-ups are annoying and useless.

    2. Pop-ups may contain advertising information.

    3. Some pop-ups are needed for useful features on a Web site.

    4. Yahoo! Mail uses a pop-up box for its address book.

  1. Unusual ads that pop up on your computer without any apparent action on your part are probably the result of:

    1. pop-up software.

    2. adware software.

    3. cookies.

    4. a hacker.

  1. An example of data mining is:

    1. gathering information about consumers’ shopping habits.

    2. requesting a user to enter personal information.

    3. using a large database to enter user data.

    4. using a search engine such as Yahoo.

  1. Which of the following statements regarding antiadware and antispyware software is FALSE?

    1. You should update the software on a regular basis.

    2. You should select all items identified as threats that you want to delete from your computer.

    3. You should run a scan for adware and spyware on a regular basis.

    4. Adware can do data mining although spyware can’t.

  1. The recording of information you type, such as passwords and credit card information, is performed by:

    1. Remote Access Trojans.

    2. Viruses

    3. Keystroke Loggers.

    4. Adware.

  1. Which of the following allows hackers to control your PC remotely?

    1. Remote Access Trojans

    2. Viruses

    3. Keystroke Loggers

    4. Adware

  1. The process of tracking includes:

    1. checking your computer for unwanted files.

    2. keeping a log of unwanted intruders.

    3. recording your surfing habits.

    4. identifying types of intrusion.

  1. Which of the following statements is FALSE?

    1. Adware and spyware can invade your privacy.

    2. Adware and spyware are mostly an annoyance rather than a threat.

    3. Software deployed by hackers may be a threat to your computer.

    4. Data mining refers to companies gathering information about your surfing habits.

Learn More about Spyware and Adware
Task: Some people consider adware and spyware to be the same thing. Decide whether you agree or disagree.
Assignment: Research definitions of adware and spyware on the Internet and summarize them in three sentences.




Compare Two Products
Task: Everyone would like to stop unwanted advertising, from junk mail to spam, from television commercials to pop-up ads online. Investigate two pop-up ad stoppers and see how they compare.
Assignment: Find and compare two different pop-up advertising blockers and list the following information for each one:


  • Downloadable programs can be located at and

  • Some programs are Pop-Up Stopper ( and Ad-Aware (

Research File Sharing
Task: Find out what additional dangers you expose yourself to when you install P2P programs on your computer.
Assignment: says that “using P2P software carries many hidden dangers, not least among them a highly effective virus distribution mechanism.” Research P2P software risks and answer the following questions:
1. What is P2P software?

2. Why is P2P software more dangerous than other software you might install on your computer?

3. What are two examples of specific P2P programs that are used today?




  • Many P2P programs are listed on Yahoo’s P2P page:

  • How Stuff Works explains how various file sharing systems work:

In the News
Task: Search for the latest news on adware and spyware.
Assignment: Use at least two sources of information to find out about a current (within the last six months) problem related to adware or spyware on the Internet.

  • Any search engine (,, etc.)

Copyright © 2009 Prentice-Hall. All rights reserved.

Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur © 2016
rəhbərliyinə müraciət

    Ana səhifə