Page 80 - Trackpad 402_Class-X_Final
P. 80

Scanning and Cleaning Virus                                                                                                   Who are Online Predators?
        Scanning and cleaning a virus prevents any viruses from entering and will also clean any viruses that may have entered        Online predators are internet users whose main purpose is to trap innocent people for inappropriate relationships.
        your computer system unknowingly. Install Anti-virus or anti malware software to keep your system safe.                       They may be of older age and pretend to be of yours by creating fake social networking accounts with fake pictures to

        Anti-virus software is a program designed to prevent,detect and remove malicious programs from the computer. After            lure you to do illegal activities which can be online or face to face.
        you install the anti-virus software runs automatically in the background to provide real-time protection against virus        What are Internet Scams?
        attacks. You should also  run full system scans periodically. Some examples of anti-virus software are McAfee Virus
        Scan, Norton Anti-Virus, Microsoft Security essentials, Quick Heal etc.                                                       Internet scams are the use of Internet services to take undue advantage of others. Some internet users may take
                                                                                                                                      advantage of innocent people browsing the internet. They pretend to be different by using fake name, age, profile  and
        Windows Defender is an antivirus software that's included in the Windows operating system that  protects your device          do financial frauds by taking out money from their bank accounts or stealing their credit cards information and using
        from viruses and other malware and threats. To turn on the Windows defender in your computer do the following step:           it for online transactions or involving in some kind of unwanted relationships.
        In Windows 10, click Start → Run, type Windows Defender, and press Enter.

        Some of the commonly used antivirus software are given below:                                                                                         Answer the following questions:
                                                                                                                                               uiz Bee        1. What is Spam?
                                                                                                                                                              2. How many types of virus?
                                                                                                                                                              3. What is the need for an anti-virus and firewall?
                                                                                                                                                              4. How can we tell if a website is secure or not?





               Quick Heal            Avira              McAfee               Norton                 AVG                                       WHAT ARE TEMPORARY FILES?
                                                                                                                                      Temporary files are created temporarily by programs that store information related to the file you are working on
                PROTECTING YOUR DATA                                                                                                  in your computer. It  increases the efficiency of  the software and also helps in recovering the data at the time of
                                                                                                                                      unexpected closing of the file due to power failure or system shut down.
        Data protection is safeguarding your data from data
        damage or data access  by unauthorised  people.  It                                                                           Temporary files are deleted automatically when the task or program you have been working on is completed. If all the
        is always a good  practice to maintain  and  protect                                                                          programs in a computer are closed and temporary files still exist then look for files with the extension .tmp in the folder
        your computer by following some precautions  and                                                                              TEMP. They are of no use and they block a lot of disk space. It is better to delete them as they hinder the performance
        managing  a few computer settings.  Some  of  the                                                                             of your computer. If the deleted temporary file is required by the program again then it is automatically recreated
                                                                                                                                      without affecting your programs.
        important points to take care are:
                                                                                                                                      To remove temporary files in a computer follow the given steps:
        •  Use proper passwords combinations for your
          computer login:  At the time to allocate passwords                                                                          Step 1:  Click on the File Explorer icon on the taskbar.
          take care to use the combinations of small letters,                                                                         Step 2:  In the file explorer that opens select Local Disk (C:).
          upper case, numbers, and special characters like $,
          %, &, etc. These combinations are difficult to hack and will be able to save your computer from unauthorised access.
        •  Install Anti-virus and Firewall: Anti-viruses and Firewall will not allow the unwanted data to enter your computer.
          If by mistake you download any malicious code then antivirus or antimalware software will warn you and then will
          remove it from your computer. This way you will be able to project your data from getting damaged or stolen.
        •  Encrypt Data:  Data encryption  is  converting the readable data into  unreadable  encoded  form to  save it  from
          unauthorised access. Sometimes sensitive data like personal credit card transactions you do in online purchasing or
          data from defence services need to be transmitted through the internet or any other network should be encoded
          to protect the information.
        •  Secure sites: Websites that you access should be secured websites to avoid data hacking specially when you do
          online transactions using your bank details or credit cards. If the site address starts with https:// and a lock symbol,
          then it is safe to access.
                                                                                                                                      Step 3:  Properties option from the Shortcut menu. Select General Tab.



          80    Trackpad Information Technology-X
   75   76   77   78   79   80   81   82   83   84   85