Page 80 - Trackpad 402_Class-X_Final
P. 80
Scanning and Cleaning Virus Who are Online Predators?
Scanning and cleaning a virus prevents any viruses from entering and will also clean any viruses that may have entered Online predators are internet users whose main purpose is to trap innocent people for inappropriate relationships.
your computer system unknowingly. Install Anti-virus or anti malware software to keep your system safe. They may be of older age and pretend to be of yours by creating fake social networking accounts with fake pictures to
Anti-virus software is a program designed to prevent,detect and remove malicious programs from the computer. After lure you to do illegal activities which can be online or face to face.
you install the anti-virus software runs automatically in the background to provide real-time protection against virus What are Internet Scams?
attacks. You should also run full system scans periodically. Some examples of anti-virus software are McAfee Virus
Scan, Norton Anti-Virus, Microsoft Security essentials, Quick Heal etc. Internet scams are the use of Internet services to take undue advantage of others. Some internet users may take
advantage of innocent people browsing the internet. They pretend to be different by using fake name, age, profile and
Windows Defender is an antivirus software that's included in the Windows operating system that protects your device do financial frauds by taking out money from their bank accounts or stealing their credit cards information and using
from viruses and other malware and threats. To turn on the Windows defender in your computer do the following step: it for online transactions or involving in some kind of unwanted relationships.
In Windows 10, click Start → Run, type Windows Defender, and press Enter.
Some of the commonly used antivirus software are given below: Answer the following questions:
uiz Bee 1. What is Spam?
2. How many types of virus?
3. What is the need for an anti-virus and firewall?
4. How can we tell if a website is secure or not?
Quick Heal Avira McAfee Norton AVG WHAT ARE TEMPORARY FILES?
Temporary files are created temporarily by programs that store information related to the file you are working on
PROTECTING YOUR DATA in your computer. It increases the efficiency of the software and also helps in recovering the data at the time of
unexpected closing of the file due to power failure or system shut down.
Data protection is safeguarding your data from data
damage or data access by unauthorised people. It Temporary files are deleted automatically when the task or program you have been working on is completed. If all the
is always a good practice to maintain and protect programs in a computer are closed and temporary files still exist then look for files with the extension .tmp in the folder
your computer by following some precautions and TEMP. They are of no use and they block a lot of disk space. It is better to delete them as they hinder the performance
managing a few computer settings. Some of the of your computer. If the deleted temporary file is required by the program again then it is automatically recreated
without affecting your programs.
important points to take care are:
To remove temporary files in a computer follow the given steps:
• Use proper passwords combinations for your
computer login: At the time to allocate passwords Step 1: Click on the File Explorer icon on the taskbar.
take care to use the combinations of small letters, Step 2: In the file explorer that opens select Local Disk (C:).
upper case, numbers, and special characters like $,
%, &, etc. These combinations are difficult to hack and will be able to save your computer from unauthorised access.
• Install Anti-virus and Firewall: Anti-viruses and Firewall will not allow the unwanted data to enter your computer.
If by mistake you download any malicious code then antivirus or antimalware software will warn you and then will
remove it from your computer. This way you will be able to project your data from getting damaged or stolen.
• Encrypt Data: Data encryption is converting the readable data into unreadable encoded form to save it from
unauthorised access. Sometimes sensitive data like personal credit card transactions you do in online purchasing or
data from defence services need to be transmitted through the internet or any other network should be encoded
to protect the information.
• Secure sites: Websites that you access should be secured websites to avoid data hacking specially when you do
online transactions using your bank details or credit cards. If the site address starts with https:// and a lock symbol,
then it is safe to access.
Step 3: Properties option from the Shortcut menu. Select General Tab.
80 Trackpad Information Technology-X

