Computer Hacking
Viruses
Safeguarding
Cookies and Spyware:
Health Concerns
100
personal
Hacking involves invading someone else’s computer, usually for ______ gain?
100
viruses
Computer ______ are a program that has been written, usually by a hacker, to cause corruption of data on a computer!
100
trusted source
Never open an e-mail attachment unless you are expecting it and it is from a _________ _______.
100
cookies
Clean up unnecessary _______ on your computer frequently with a utility program.
100
comfort, health, and safety
Make sure you use a computer in a way that supports your ______, _______, and _________.
200
computer experts
Hackers usually are ________ ________ who enjoy having the power to invade someone else’s privacy. (two words)
200
itself
Worms makes many copies of _______ , resulting in the consumption of system resources that slows down or actually halts tasks and don’t have to attach themselves to other files to infect your computer.
200
security
download and install the latest _________ updates for you operating system.
200
Spyware
________ tracks your web habits and can be harmful as well as annoying.
200
muscle fatigue and discomfort
Sitting In the same position for long periods of time causes ________ ________ and __________.
300
steal, change or damage
They can _______ ,_______ or______ data stored on a computer.
300
Trojan horse
A ______ _______ is a program that hides within or looks like a legitimate program. A certain condition or action usually triggers the Trojan horse.
300
firewall
A ______ is hardware and/or software that protect the network’s resources from intrusion by users on another network such as the Internet.
300
eye strain
Staring At a computer screen can cause ___ ______.
400
a computer virus, and, /or Trojan Horses.
Every unprotected computer is susceptible to the first type of computer security--- _______ ______, ___, /or ______ ______.
400
malware (short for malicious software)
Computer viruses, worms, and Trojan horses are classified as _______ (_____ ___ _______ ________) which are programs that act without a user’s knowledge and deliberately alter the computer’s operations.
400
180,000
Currently, more than ________ known viruses, worms, and Trojan horse programs exist.
400
passwords
The best way to protect data is to effectively control the access to it using _______ or login information.
400
motion and sight
Change your position as you use a computer to encompass a range of _____ and _____.
500
smart
computer hackers are usually ________?
500
key logger
A ___ ______ is a malicious program that records keystrokes’.
500
information
Any time you submit _________ on the internet, it can possibly be gathered and used.
500
computer technology
It is your responsibility to stay informed about changes and advancements in _______ _________, product upgrades, and virus threats.
500
posture
Pay attention to your _______, lighting, and activity level.
M
e
n
u