Free Essay

Internet and E-Mail

In: Computers and Technology

Submitted By rongrs1
Words 1691
Pages 7
Computer Repairs
Components of the System Unit
Objectives
At the end of this unit students should be able to: 1. List and describe the major components in a personal computer system unit 2. Identify the ports, connectors and slots on a motherboard 3. Outline the computer boot process 4. State the meaning of common computer abbreviations and acronyms
Content Summary
Major Components in the System Unit
Case
A computer case is the enclosure that contains the main components of a computer. The size and shape of a computer case is usually determined by the form factor of the motherboard. In computing, "form factor" is an industry term for the size, shape and format of computer motherboards, power supplies, cases, and add-on cards. Most desktop computers have a form factor that is some variant of ATX.
A case designed for an ATX motherboard and power supply may take on several external forms, such as a vertical tower (designed to sit on the floor, height > width) or a flat desktop (height < width).
Computer cases usually include: sheet metal enclosures for a power supply unit and drive bays; a rear panel that can accommodate peripheral connectors protruding from the motherboard and expansion slots; a power button, a reset button, and LEDs to indicate power status as well as hard drive and network activity.

Major component locations * The motherboard is usually screwed to the case along its largest face, which could be the bottom or the side of the case depending on the form factor and orientation. * Form factors such as ATX provide a back panel with cut-out holes to expose I/O ports provided by integrated peripherals, as well as expansion slots which may optionally expose additional ports provided by expansion cards. * The power supply unit is often housed at the top rear of the case; it is usually attached with four screws to support its weight. * Most cases include drive bays on the front of the case; a typical ATX case includes both 5.25" and 3.5" bays. In modern computers, the former are used mainly for optical drives, while the latter are used for hard drives, floppy drives, and card readers. * Buttons and LEDs are typically located on the front of the case; some cases include additional I/O ports, temperature and/or processor speed monitors in the same area. * Vents are often found on the front, back, and sometimes on the side of the case to allow cooling fans to be mounted via surrounding threaded screw holes.
Power Supply Unit
A power supply unit (PSU) converts mains AC to low-voltage regulated DC power for the internal components of a computer.
Power supplies use switcher technology to convert the AC input to lower DC voltages. The typical voltages supplied are: 3.3, 5 and 12 volts.
The 3.3- and 5-volts are typically used by digital circuits, while the 12-volt is used to run motors in disk drives and fans.
The main specification of a power supply is in watts. Power requirements for a modern desktop personal computer may range from 300 watts to more than 1000 watts for a high-performance computer with multiple discrete graphics cards.
While a power supply is connected to the mains supply, it always provides a 5 V standby (5VSB) voltage so that the standby functions on the computer and certain peripherals are powered.
The power supply are turned on and off by a signal from the motherboard. They also provide a signal to the motherboard to indicate when the DC voltages are in spec, so that the computer is able to safely power up and boot.
Typically, power supplies have the following connectors: * PC Main power connector (usually called P1): This is the connector that goes to the motherboard to provide it with power. The connector has 20 or 24 pins. One of the pins belongs to the PS-ON wire (it is usually green). * ATX12V 4-pin power connector (also called the P4 power connector). A second connector that goes to the motherboard (in addition to the main 24-pin connector) to supply dedicated power for the processor. * 4-pin Peripheral power connectors: These are the other, smaller connectors that go to the various disk drives of the computer. Most of them have four wires: two black, one red, and one yellow. Unlike the standard mains electrical wire color-coding, each black wire is a ground, the red wire is +5 V, and the yellow wire is +12 V. * 4-pin Molex (usually called Mini-connector): This is one of the smallest connectors that supply a 3 1/2 inch floppy drive with power. Its cable configuration is similar to the Peripheral connector. * Serial ATA power connectors: a 15-pin connector for components which use SATA power plugs. This connector supplies power at three different voltages: +3.3, +5, and +12 volts.
Motherboard
A motherboard (sometimes alternatively known as the mainboard, system board, planar board or logic board) provides the electrical connections by which the other components of the system communicate.
A typical desktop computer has its microprocessor and main memory connected directly onto the motherboard, other components and peripheral devices may be attached as plug-in cards or via cables.

Modern motherboards include, at a minimum: * Sockets in which one or more microprocessors may be installed. * Slots into which the system's main memory is to be installed * A chipset which forms an interface between the CPU, main memory, and peripheral buses * Non-volatile memory chips containing the system's firmware or BIOS * A clock generator which produces the system clock signal to synchronize the various components * Slots for expansion cards * Power connectors, which receive electrical power from the computer power supply and distribute it to the CPU, chipset, main memory, and expansion cards. * Integrated circuits and connectors to support commonly used input devices * Heat sinks and mounting points for fans to dissipate excess heat.
Central Processing Unit
The central processing unit, or CPU, is that part of a computer which executes software program instructions.
The clock rate is the speed at which a microprocessor executes instructions. The faster the clock, the more instructions the CPU can execute per second.
Processing performance of computers is increased by using multi-core processors, which essentially is plugging two or more individual processors (called cores in this sense) into one integrated circuit.
The CPU often plugs into the motherboard using one of many different types of sockets.
A CPU socket or slot is a special type of integrated circuit socket designed for very high pin counts. A CPU socket type and motherboard chipset must support the CPU series and speed.
Main Memory
A computer’s main memory, or primary storage, is fast storage that is directly accessible by the CPU, and is used to store the currently executing program and immediately needed data.
RAM (random access memory) used for primary storage is volatile, meaning it does not retain its contents in the absence of power
ROM (read only memory) is a non-volatile part of the main memory that contains a small startup program (BIOS) used to boot the computer (the terminology may be somewhat confusing as this ROM is also random access).
Auxiliary Storage
Auxiliary storage, or secondary storage, differs from primary storage in that it is not directly accessible by the CPU and it does not lose the data when the device is powered down—it is non-volatile.
Per unit, auxiliary storage is typically also two orders of magnitude less expensive than primary storage. Consequently, modern computer systems typically have two orders of magnitude more secondary storage than primary storage (4 GB RAM vs. 500 GB HDD in a typical computer) and data are kept for a longer time there.
In modern computers, hard disk drives are usually used as secondary storage. The time taken to access a given byte of information stored on a hard disk is typically a few thousandths of a second, while the time taken to access a given byte of information stored in random-access memory is measured in billionths of a second.
Some other examples of secondary storage technologies are USB flash drives, floppy disks and magnetic tape.
The secondary storage is often formatted according to a file system format, which provides the abstraction necessary to organize data into files and directories.
Expansion Card
The expansion card (also expansion board, adapter card or accessory card) is a printed circuit board that can be inserted into an expansion slot on the motherboard to add functionality to a computer system via the expansion bus.
One edge of the expansion card holds the contacts (the edge connector) that fit exactly into the slot. Connectors mounted on the bracket allow the connection of external devices to the card.
Depending on the form factor of the motherboard and case, around one to seven expansion cards can be added to a computer system.
Connection systems between expansion card and motherboard include: * Industry Standard Architecture (ISA): Introduced in 1981 by IBM, it became dominant in the marketplace in the 1980s. It was an 8 or 16-bit bus clocked at 8 MHz. * Extended Industry Standard Architecture (EISA): Released in 1988, it was compatible with the earlier ISA bus. It was a 32-bit bus clocked at 8.33 MHz. * Peripheral Component Interconnect (PCI): Replaced the EISA/ ISA buses from 1993 onwards. PCI allowed dynamic connectivity between devices, avoiding the manual adjustments required with jumpers. It is a 32-bit bus clocked 33 MHz. * Accelerated Graphics Port (AGP): First used in 1997, it is a dedicated-to-graphics bus. It is a 32-bit bus clocked at 66 MHz. * PCI-eXtended (PCI-X): An extension of the PCI bus, it was introduced in 1998. It improves upon PCI by extending the width of bus to 64-bit and the clock frequency to up to 133 MHz. * PCI Express (PCIe): A point to point interface released in 2004, provided double the data-transfer rate of AGP. It should not be confused with PCI-X.
Motherboard Ports
The following images show ports and slots typically found on a modern PC motherboard.

Similar Documents

Premium Essay

E-Mail and Internet Policy

...E-Mail and Internet Policy Darryn Cooper COM/285 Angie Robert August 24, 2011 E-Mail and Internet Policy The integrity of a business relies on communication, both using internal and external communications. E-mails and the internet are two ways that businesses communicate with shareholders, employees and their customers. In today’s global market, the use of computer guidelines and policies have been implemented to ensure that all employees adhere to those policies. Communication via the internet and use of emails should be carefully considered when using it. This essay will discuss why e-mail and internet policies have been put in place. *1Congress passed the Privacy Act of 1974, as amended, (Privacy Act) to safeguard records of information pertaining to individuals that Federal agencies or components own and maintain. The Department of Defense (DoD) policy regarding e-mail and internet use is very strict. All employees who are employed by the DoD are given a Common Access Card (CAC). The CAC is inserted into the computer and requires that you enter a password. At no time should you leave your CAC in the computer when an individual leaves his or her computer. Ashmore ( 2009), " Many federal laws affect employer regulation of email and internet uses, such as the Federal Wiretap Act; the Electronic Communications Privacy Act; and the Stored Communications Act. In addition, state...

Words: 941 - Pages: 4

Premium Essay

E-Mail, Internet and Privacy Policies

...Running Header: E-MAIL, INTERNET, AND PRIVACY POLICIES E-Mail, Internet and Privacy Policies University of Phoenix Com 285: Introduction to Business Communication Group: MEBSB039 May 5, 2009 E-Mail, Internet and Privacy Policies With the invention of the internet, many conveniences have been developed to help companies run more efficient. E-Mail was developed to replace standard written messages. This form of communication sped up the receipt of messages from one person to another. Internet and e-mail have become, and will remain a necessary tool for the modern business to succeed. The internet is also used as a way to communicate globally. For instance, a company with offices in the United States and the United Kingdom, now has the ability communicate information at the speed of light. With the advancement of modern technology comes the advancement of ways to steal information and violate the privacy of an employee or the company. Companies have put privacy policies in place to protect employees and the company. Information that could be misused and potentially harm the employee or put the company at risk could easily be sent over the internet through unsecured means. This paper is meant to discuss e-mail, internet use, and privacy policies at the place of employment of the writer. Secondly, we will discuss the laws put in place to regulate employee’s e-mail and internet policies. Thirdly, we will discuss the reasons...

Words: 972 - Pages: 4

Premium Essay

Internet and Email Aups

...E-mail Acceptable Use Policy Purpose E-mail is a critical mechanism for business communications at Richman Investments. However, use of Richman Investments’ electronic mail systems and services are a privilege, not a right, and therefore must be used with respect and in accordance with the goals of Richman Investments. The objectives of this policy are to outline appropriate and inappropriate use of Richman Investments’ e-mail systems and services in order to minimize disruptions to services and activities, as well as comply with applicable policies and laws. Scope This policy applies to all e-mail systems and services owned by Richman Investments, all e-mail account users/holders at Richman Investments (both temporary and permanent), and all company e-mail records. Account Activation/Termination E-mail access at Richman Investments is controlled through individual accounts and passwords. Each user of Richman Investments’ e-mail system is required to read and sign a copy of this E-mail Acceptable Use Policy prior to receiving an e-mail access account and password. It is the responsibility of the employee to protect the confidentiality of their account and password information. All employees of Richman Investments will receive an e-mail account. E-mail accounts will be granted to third-party non-employees on a case-by-case basis. Possible non-employees that may be eligible for access include: • Contractors. • Employees. • Interns. Applications for these temporary...

Words: 1904 - Pages: 8

Premium Essay

Internet

...Internet Mario Robles Com/285 July 13, 2011 Patricia Madrill Internet In my current workplace e-mails are non-existing, e-mails between our company members are avoided and communication is done through cell phone or radio call. Therefore, policies about Internet use are not available and not required in this stage of the company. However, if our company where to provide employees with Internet privileges I can see why they would want to implement Internet policies. With those policies the company enforcing them should be aware that employees would not be completely satisfied with about their privacy and think that their personal business is no longer personal. * What are the e-mail use, Internet use, and privacy policies at your job? * In my current workplace policies about Internet usage are not stringent, reason being everyone in the company has their own laptop. My company, after you have been with them for a year will give you a $1,000 gift card. This gift card is not just free money, it comes with two restrictions. The first restriction is that you should use 75% of this money toward the purchase of a new lap top, the second restriction is that the rest of the money has to be spent on a Verizon wireless card and a two-year subscription fee with a Verizon wireless vendor. Once you have purchase this items if there is any money left you may use...

Words: 1109 - Pages: 5

Premium Essay

April Internet Paper Week5

...Addressing e-mail, Internet use, and privacy policies What are the e-mail, Internet use and privacy policies at your job? The e-mail use at my job is that it can’t be used for personal use, but only company business. Internet use at my job is definitely for business use only. At my job I can’t get on it to shop or pay bills, but only for company business. The privacy policy is your own personal information that you allow your company to have, but you still have right’s. The company can not disclose any of your information. The privacy policy can also help protect you against internet fraud, make sure your computer is safe, and also protect you and your personal information. What are the current laws regulating employee e-mails and internet privacy? One law is the at-will law. This law gives an employer the right to relieve an employee of duty with any explanation what so ever. The employer does not need a reason, you can show up for work one day, and they can let you go without any explanation. Another law is when a company does not allow a union in the company. A union can prevent a employee from being relieved of duty without any just cause. With a union there has to be a valid reason for letting an employee go. Employees have constitutional rights to privacy; it cannot be invaded according to the law. Most companies have the right to retrieve your e-mail and internet use. Why do companies implement e-mail and internet use policies? Most companies implement e-mail and internet...

Words: 1150 - Pages: 5

Free Essay

Af 302

...temporarily holds data for processing while the computer’s storage area is where data is stored on a more permanent basis. Output is what is produced by a computer. Today’s computers work by loading a set of instructions into memory from a stored program and then allowing those instructions to be executed to produce output. This concept allows you to use your computer for multiple tasks, such as word processing, image editing, sending e-mails, and much more. Nearly all of today’s computers use some type of microprocessor, or single chip CPU, so the older classifications of microcomputer, minicomputer, and mainframe computer to classify computers are no longer used today. Computers are now categorized based on their intended use and physical sizes. Typical categories include personal computers, handheld computers, workstations, videogame consoles, mainframes, supercomputers, and servers. A personal computer is one designed to meet the computing needs of an individual person, usually those computers for e-mail, word processing, and internet access. Personal computers can be desktop computers, notebooks, or tablet computers. A personal computer system usually contains a system unit, display devices, keyboard, mouse, floppy disk drive, hard disk drive, CD and DVD drives, sound card and speakers,...

Words: 4279 - Pages: 18

Premium Essay

Affordances and Constraints of E-Mail as an Ict Tool in Learning

...times, information communication technology (ICT) has become an integral part of everyday life for many people. ICT encompasses a large scope of technological resources “that are used to create, communicate, store, disseminate and manage information” (EDTK2030: Unit 1, p. 3). Examples of such include computers, computer programs, mobile phones, and televisions. Over the years ICT has become more prominent within the educational system; such technology is used for administrative and managerial work, and now more frequently for teaching and learning practices and opportunities within classrooms (Kamau, 2012). One of the ICT tools utilized for learning is electronic mail (e-mail). E-mails are electronic messages distributed from one person to another via the use of a computer and network system. ICT tools, such as e-mails, offer both affordances and constraints, as well as require knowledge of how learning occurs in order to be incorporated into teaching and learning practices; however, there are solutions to the constraints associated with such tools. Affordances, as indicated by Norman (As cited in Hammond, 2010, p. 208), are the “perceived and actual properties” and functions of a mechanism, that define its possible uses in certain situations. However, affordances typically coexist with constraints (EDTK2030: Unit 1), which are certain boundaries that limit the way in which an object or mechanism can be manipulated. Despite the affordances, ICT tools used for education purposes...

Words: 1069 - Pages: 5

Free Essay

Email Etique

...office e-mail? Is that legal? YESTERDAY, as you sat working at your desk, you checked your e-mail and spotted a note from a friend. The message was an off-color joke complete with graphic illustration. Sure, some stick-in-the-mud might find it offensive, but it was awfully funny. So, without thinking, you clicked on the forward button, typed in an e-mail address or two or three, and hit the send button. No big deal, right? You don't give the e-mail another thought until this morning when a somber supervisor invites you to her office. She hands you a letter of reprimand along with a copy of the e-mail. She tells you that as a matter of office policy, employee e-mails are monitored. Copies are placed in your file, and, in the event it happens again, she warns that you'll receive a termination letter. It simply never occurred to you that someone might be monitoring your e-mail. What about your right to privacy? WHAT HAPPENED TO PRIVACY? As an employee, the idea of being monitored may trouble you. As an employer, the idea of monitoring employees may be equally distasteful. The right to privacy is so thoroughly ingrained in most of us that we take it for granted--especially in a peaceful environment when we're sitting alone, typing into a computer. We may be lulled into a false sense of isolation and freedom from observation. But even if the technology is available, aren't there simply too many e-mails and too much Internet use to review effectively? After all, the Internet is so...

Words: 1150 - Pages: 5

Premium Essay

Technology Papers

...Employee Privacy Report Rhyan Vee BIS R Alizade The use of the Internet and e-mail within the workplace domains has attained a great deal of significance. This is because employees are being monitored within the workplace realms, in order to check the employees work manifestations and gauge what kind of work they are carrying on, on the Internet. This is important because it divulges the employees thinking mechanisms. I will discuss a few pertinent aspects related with the technological usage within my workplace. E-mail use, Internet use, and Privacy Policies Technological issues at my workplace are handled in a fair and balanced manner. This is why the network architecture has gained importance within my workplace realms. A fact is that the use of technology is within the prescribed rules and standards. The use of e-mail and the Internet is restricted but not so much so that employees are forbidden. They can use it with moderation and hence do their jobs at the same time. The e-mails are exchanged among the company employees on an intranet e-mail system. Similarly blogs and internal websites are made use of that discuss the different aspects of the work on a regular basis. “The workplace limits the use of bandwidth because if more of this is used, serious issues could arise for the entire network” (Zollers, 2003). The use of the Internet is carried out in such a manner that nearly all the network users are shared properly and there...

Words: 1365 - Pages: 6

Premium Essay

Employee Privacy Rights in the Workplace

...created to manage their impacts. Privacy issues often arise in connection with employer efforts to locate, hire and evaluate the most qualified and reliable employees. Improvements in technology, such as the rapid rise of the use of electronic mail and the increasing use of surveillance cameras, often force otherwise reluctant employers to readdress the balance between employees' privacy concerns and perceived business needs. In fact, nearly 67% of all companies currently use some type of surveillance in the workplace. According to a recent poll, “. . . over 66% percent of those surveyed had used the Internet from work in the past 24 hours.” (M.Lee Smith Publishers, Hospitality Workforce Trends, January 2000) In addition, when issues in his or her personal life impact an employee’s work, the employer must make judgments as to the appropriate level of involvement. Lastly, as traffic on the “information superhighway” continues to explode a number of substantive questions about the use and abuse of these information networks arises. What are the ramifications for employees’ right to privacy in the workplace? Does an employer have the right to search an employee’s computer files or review the employee’s electronic mail (“E-mail”)? What are the advantages and disadvantages of using surveillance at the workplace? As you will read in detail later in this chapter, the laws governing electronic surveillance have largely favored employers, both in the private and public sectors...

Words: 3154 - Pages: 13

Premium Essay

Ethics

...SAMPLE INTERNET USAGE POLICY Policy: Access to the Internet through the Company is a privilege. Users granted this privilege must adhere to strict guidelines concerning the appropriate use of this information resource. Users who violate the provisions outlined in this document are subject to disciplinary action up to and including termination. In addition, any inappropriate use that involves a criminal offense will result in legal action. All users are required to acknowledge receipt and understanding of guidelines contained in this document. Purpose: To define policies and procedures for access to the Internet through the Company network infrastructure. Scope: This policy applies to all personnel with access to Internet and related services through the Company network infrastructure. Internet Related services include all services provided with the TCP/IP protocol, including but not limited to Electronic Mail (e-mail), File Transfer Protocol (FTP), Gopher, and World Wide Web (WWW) access. Procedure: 1. ACCEPTABLE USE 1. Access to the Internet is specifically limited to activities in direct support of official Company business. 2. In addition to access in support of specific work related duties, the Company Internet connection may be used for educational and research purposes. 3. If any user has a question of what constitutes acceptable use he/she should check with their supervisor for additional guidance. Management or supervisory...

Words: 1375 - Pages: 6

Premium Essay

Mini Case Ii Deals-R-Us Brokers (Part 1)

...over the Internet, as well as place traditional orders by phone or fax. DRUB has just decided to install a new e-mail package. One vendor is offering SMTP-based two-tier client-server architecture. The second vendor is offering Web-based e-mail architecture. Fred doesn’t understand either one but thinks the Web-based one should be better because, in his words, “the Web is the future.” a. Briefly explain to Fred, in layperson’s terms, the differences between the two. b. Outline the pros and cons of the two alternatives and make a recommendation to Fred about which is better. How E-mail Works The Simple Mail Transfer Protocol (SMTP) is the most commonly used e-mail standard simply because it is the e-mail standard used on the Internet. E-mail works similarly to how the Web works, but it is a bit more complex. SMTP e-mail is usually implemented as a two-tier thick client-server application, but not always. Two-Tier Thick E-mail Architecture With two-tier thick client-server architecture, each client computer runs an application layer software package called a mail user agent, which is usually more commonly called an e-mail client (Figure 1). There are many common e-mail client software packages such as Eudora and Outlook. The user creates the e-mail message using one of these e-mail clients, which formats the message into an SMTP packet that includes information such as the sender’s address and the destination address. The user agent then sends the SMTP packet to a mail server...

Words: 1912 - Pages: 8

Free Essay

Intro to Computers

...Introduction to Computers and the Internet 2 Lesson 1 What Is a Computer? n Personal Computer Hardware n Peripherals n Bits and Bytes n Computer Speed and MHz and GHz n Computer Types Lesson 2 Software n Obtaining Application Software Lesson 3 The Internet n Finding Information on the Web n Evaluating Information on the Web Lesson 4 Understanding E-mail n Sending and Receiving E-mail and Other Forms of Digital Communication n Dangerous E-mail Lesson 5 Types of Computer Crimes n Copyright Laws n Acceptable Use Policies Lesson 6 Computer Workers 3 Introduction to Computers and the Internet 4 WORDS TO KNOW BIOS The basic input-output system is the component that checks your computer’s components and causes the operating system to start. CMOS Complementary Metal Oxide Semiconductor is a chip whose configuration is controlled by a setup program. CPU The Central Processing Unit is a chip, located on the motherboard, which performs mathematical calculations and logic functions. Hardware Refers to all the pieces of physical equipment that make up a computer system. Input Data entered into a computer. Lesson 1 What Is a Computer? n n n n n Computers are a vital part of today’s world. They make controlling and using devices faster, easier, and more accurate. They are in everything from automobiles to washing machines...

Words: 9593 - Pages: 39

Premium Essay

Monitoring Employees on Networks

...Monitoring Employees on Networks How does e-mail benefit an organization? Why might an organization want to limit how an employee uses e-mail during work hours? What is an e-mail’s path once it leaves an organization? * E-mail enables messages to be exchanged from computer to computer, with capabilities for routing messages to multiple recipients, forwarding messages, and attaching text documents or multimedia files to messages. Nearly 90 percent of U.S workplace has employees communicating interactively using chat or instant messaging tools. Many online retail businesses offer chat services on their Web sites to attract visitors, to encourage repeat purchases, and to improve customer service. Organizations want to limit their employees from using e-mail or the internet during work hours because it’s considered an interruption that distracts the employee from doing their job tasks that they are supposed to be preforming. Managers worry about the loss of time and employee productivity when employees are focusing on personal rather than company business. Too much time on personal business, on the Internet or not, can mean lost revenue or overbilled clients. If personal traffic on company networks is too high, it can also clog the company’s network so that legitimate business work cannot be performed. When employees use e-mail or the Web at employer facilities or with employer equipment, anything they do, including anything illegal carries the company’s name. Companies also...

Words: 952 - Pages: 4

Free Essay

Completion Exercises

...Written Exercise Unit 2 Assignment 5 Completion Exercises Find the word or phrase that completes each of the following statements. All these questions refer to Internet, e-mail, and networking. 1. E-mail is short for ________________________ | 1. electronic mail | 2. How long does it take for an e-mail message to arrive in the recipients inbox? | 2. within seconds or minutes | 3. In order to use e-mail you must have an Internet connection, an e-mail program, and ________________________ | 3. e‑mail address | 4. Name two free e-mail services. | 4. yahoo and gmail | 5. The e-mail messages you have just received are in your __________ | 5. inbox | 6. Sequences of keyboard characters that symbolize facial expressions are called __________________________ | 6. emoticons | 7. Another name for junk e-mail is __________________ | 7. spam | 8. Using caution in giving out your e-mail address, checking a site’s privacy statement before giving your address and never replying to junk e-mail messages will _______________________ | 8. help prevent junk e‑mail | 9. Computer criminals who attack other people’s computers are called ________________________ | 9. hackers | 10. A small program that can help prevent hackers and malicious software from gaining access to your computer is called a(n) _________________ | 10. Firewall | 11. A small program that can help protect your computer viruses, worms, and other security threats is called ______________...

Words: 593 - Pages: 3