Page 63 - Ai_C10_Flipbook
P. 63
• The physical components are in good condition.
• Remove unnecessary applications and add ins.
• Clean your temporary files, browser history and recycle bin on a regular basis.
• Use disk clean-up and disk de-fragmentation utility programs on a regular basis to remove all unnecessary files
and information that slows down the computer so that the efficiency of the computer increases.
Removing Spam Email from Your Computer
Spam is an unwanted, unsolicited bulk message from companies for advertising, spreading malware or tricking
you to visit their insecure websites to take your personal information along with bank details. It can be received
through email, text messages, phone calls or social media.
Spam emails have become an inseparable part of our email. Some email service providers filter and mark these
spam emails and place them automatically in separate spam folders. You can also avoid getting spam messages
by following the given steps:
• Do not respond to Spam and delete it on a regular basis.
• Do not provide your email address to unknown websites or post publicly.
• Avoid clicking on unknown clicks available in between your internet browsing.
• Do not reply to spam messages.
• Download spam filtering tools and anti-virus software.
• Do not use your personal or business email address when registering in any online contest or free services
available on the internet.
Brainy Fact
20 to 50 million metric tons of e-waste are disposed worldwide every year. Only 12.5% of e-waste is
currently recycled.
Computer Security and Privacy
Computer security and privacy is about measures we can take to protect your computer, personal information, and
online activities from unauthorized access, cyber threats, and privacy breaches. For example To access your online
banking account, you use a combination of a strong password and a two-factor authentication (2FA) method, such
as receiving a verification code on your mobile device. In another example of a Health Information Management
System, used by healthcare providers, employs strict access controls. Only authorised personnel with unique login
credentials can access patient records.
Reasons for Security Break
Security break refers to the unauthorised access of sensitive information stored in a computer. Personal information
can be lost or leaked in two ways:
• We are not careful in giving out personal information over the Internet. For example, we share our account
details and passwords on unsecure sites.
• A person gets unauthorised access to our computer. This can happen in the office if we leave the computer
without logging out.
Information & Communication Technology Skills-II 61

