Page 63 - Ai_C10_Flipbook
P. 63

•  The physical components are in good condition.
                 •  Remove unnecessary applications and add ins.
                 •  Clean your temporary files, browser history and recycle bin on a regular basis.
                 •  Use disk clean-up and disk de-fragmentation utility programs on a regular basis to remove all unnecessary files
                   and information that slows down the computer so that the efficiency of the computer increases.

                 Removing Spam Email from Your Computer

                 Spam is an unwanted, unsolicited bulk message from companies for advertising, spreading malware or tricking
                 you to visit their insecure websites to take your personal information along with bank details.  It can be received
                 through email, text messages, phone calls or social media.
                 Spam emails have become an inseparable part of our email. Some email service providers filter and mark these
                 spam emails and place them automatically in separate spam folders. You can also avoid getting spam messages
                 by following the given steps:
                 •  Do not respond to Spam and delete it on a regular basis.
                 •  Do not provide your email address to unknown websites or post publicly.
                 •  Avoid clicking on unknown clicks available in between your internet browsing.
                 •  Do not reply to spam messages.
                 •  Download spam filtering tools and anti-virus software.
                 •  Do not use your personal or business email address when registering in any online contest or free services
                   available on the internet.



                              Brainy Fact


                      20 to 50 million metric tons of e-waste are disposed worldwide every year. Only 12.5% of e-waste is
                      currently recycled.


                         Computer Security and Privacy



                 Computer security and privacy is about measures we can take to protect your computer, personal information, and
                 online activities from unauthorized access, cyber threats, and privacy breaches. For example To access your online
                 banking account, you use a combination of a strong password and a two-factor authentication (2FA) method, such
                 as receiving a verification code on your mobile device. In another example of a Health Information Management
                 System, used by healthcare providers, employs strict access controls. Only authorised personnel with unique login
                 credentials can access patient records.

                 Reasons for Security Break

                 Security break refers to the unauthorised access of sensitive information stored in a computer. Personal information
                 can be lost or leaked in two ways:
                 •  We are not careful in giving out personal information over the Internet. For example, we share our account
                   details and passwords on unsecure sites.
                 •  A person gets unauthorised access to our computer. This can happen in the office if we leave the computer
                   without logging out.





                                                               Information & Communication Technology Skills-II  61
   58   59   60   61   62   63   64   65   66   67   68