Computer Hacking File Sharing Protection Cheating Virus

You might also like

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 11

COMPUTER HACKING File Sharing Protection Cheating Virus

COMPUTERS

A computer is a machine which manipulates data according to a list of instructions which makes it an ideal example of a data processing system.

HACKING

In a security context, a Hacker is someone involved in computer security/insecurity, specializing in the discovery of exploits in systems (for exploitation or prevention), or in obtaining or preventing unauthorized access to systems through skills, tactics and detailed knowledge.

COMPUTER HACKING

Computer hackers are also known as white hat hackers-a person who is ethically opposed to the abuse of computer systems. Computer hackers will take advantage of e-mail, World Wide Web, and file sharing.

COMPUTER VIRIUS

A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user.

A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive.

FILE SHARING

File sharing is the practice of making files available for other users to download over the Internet and smaller networks. There are many people that put out files of their music that they have purchased or even movies that they spent there own money. When using websites that have file sharing, the files on that website are full of music in which you can download with out a record companys permission. This is also known as stealing. When you download things onto your computer it is important that you read up on what it is you are downloading because if you dont your computer could get a virus or hacked into.

CHEATING

When it comes to cheating, computers are the one source where people go first to cheat from. Cheating is defined as an act of lying, deception, fraud, trickery, imposture, or imposition. Recently, software to statistically detect cheating on tests has been developed which compares pairs of examinees in terms of their responses to test questions. Examinees with large numbers of similar correct and incorrect responses to questions are flagged as being suspicious.

These are things that your computer can get from and loose from computer hacking.

COMPUTERS THAT HAVE BEEN HACKED INTO


COMPUTER HACKING

VIRUSES

IMPORTANT INFORMATION LOST

IF THE VIRUS IS REAL SERIOUS YOU MIGHT HAVE TO BUY A NEW COMPUTER.

WAYS TO PROTECT YOUR COMPUTER

There are several ways to protect your computer like purchasing a Norton Anti-Virus software package. Norton Anti-Virus protection is apart of the Norton Internet Security.

THE END

SOURCES
WIKIPEDIA SEARCH ENGINE

You might also like