Page 114 - TGPT_V5.0_C5_Flipbook
P. 114

Sign Out

              You should always close your e-mail account after completing your work. This is known as Sign
              out. It is very important to sign out from your account so that no one else using that computer

              can read your e-mails or send unwanted e-mails from your e-mail account. You can sign out
              from your e-mail account by following these steps:



                                                                              Click on the Google    1
                                                                              Account icon.




                               2   Click on the Sign
                                   out button.





                    COMPUTER MALWARE
                                                                                       Virus              Worm
              Malware, or malicious software, is a software made to
              cause harm to your system. A malware gets installed on a
              computer without  approval from the computer's owner.                            MALWARE          Trojan
                                                                                                                 Horse
              There are different  types of  malware, each having  unique

              characteristics. Let’s find out.
                                                                                         Spyware            Adware
              Virus

              A computer virus is a program that is able to copy itself when it is run. It gets activated each

              time the program or file to which it is attached is opened or executed. It is the most common
              type of malware. It can spread itself by infecting other programs or files. This affects the original
              program, causing it to no longer work properly.

              Worm

              A worm is similar to virus but it can copy itself and spread rapidly to any device attached. A

              worm does not need any program to activate it.

              Trojan Horse

              A trojan horse is a dangerous virus. It represents itself as helpful software program. Once the
              user clicks on it to agree to run it, it gains access to sensitive data and then modifies, blocks, or

              deletes the data. It cannot copy itself from one computer to another.

              Spyware

              A spyware steals important information and data on the device, such as account passwords or
              bank details. It observes the user's activity without their knowledge.




                  112  Premium Edition-V
   109   110   111   112   113   114   115   116   117   118   119