Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)
Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)
1st Edition
ISBN: 9781305657458
Author: Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher: Cengage Learning
Question
Book Icon
Chapter 9, Problem 1CTQ
Program Plan Intro

Operating System (OS):

  • OS is the term that acts as an interface between the hardware and the user.
  • OS does basic operations such as getting input from the keyboard, displaying output in the monitor and monitoring the files.

Windows OS tools:

  • Firewall
    • It monitors and controls the traffic on network in the system.
    • It acts as a barrier between the system and unauthorized users.
  • Antivirus software
    • It is used for identifying, preventing and deleting the errors in the system.
  • Spyware
    • It helps the unauthorized users like hacker to get access to the system.
  • Malware detection software
    • It is used for identifying, preventing and deleting the malware present in the system.
  • Automatic updating
    • It helps in updating the software without including the user permission.

Explanation of Solution

Security concerns related to built-in OS tools:

Yes” the built-in OS tools include the security concerns.

Reason:

Window...

Explanation of Solution

Alternatives:

  • Encryption
    • Encryption is the term used to define the process which helps protect the unauthorized access to data.
    • The data is hidden using some mathematical algorithms.
    • It helps to protect data during transmission of data over a network and the data stored in databases are protected.
  • Authentication
    • Authentication sequence or digital signatures are used in securing many financial transactions...

Explanation of Solution

Disability of Windows tool:

Yes”, the Windows tool must be disabled in terms of risk.

Reason:

  • The unauthorized access can be avoided by disabling the Windows tool...

Blurred answer
Students have asked these similar questions
Explain the security vulnerabilities associated with older versions of Windows and the importance of keeping the operating system up-to-date.
Explain the steps to create a new user account in Windows and set its privileges.
Explain the potential risks of modifying the Windows Registry and how to back up and restore it.

Chapter 9 Solutions

Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)

Ch. 9 - Prob. 11SGCh. 9 - Prob. 12SGCh. 9 - Prob. 13SGCh. 9 - Prob. 14SGCh. 9 - Prob. 15SGCh. 9 - Prob. 16SGCh. 9 - Prob. 17SGCh. 9 - Prob. 18SGCh. 9 - Prob. 19SGCh. 9 - Prob. 20SGCh. 9 - Prob. 21SGCh. 9 - Prob. 22SGCh. 9 - Prob. 23SGCh. 9 - Prob. 24SGCh. 9 - Prob. 25SGCh. 9 - Prob. 26SGCh. 9 - Prob. 27SGCh. 9 - Prob. 28SGCh. 9 - Prob. 29SGCh. 9 - Prob. 30SGCh. 9 - Prob. 31SGCh. 9 - Prob. 32SGCh. 9 - Prob. 33SGCh. 9 - Prob. 34SGCh. 9 - Prob. 35SGCh. 9 - Prob. 36SGCh. 9 - Prob. 37SGCh. 9 - Prob. 38SGCh. 9 - Prob. 39SGCh. 9 - Prob. 40SGCh. 9 - Prob. 41SGCh. 9 - Prob. 42SGCh. 9 - Prob. 43SGCh. 9 - Prob. 44SGCh. 9 - Prob. 45SGCh. 9 - Prob. 46SGCh. 9 - Prob. 47SGCh. 9 - Prob. 48SGCh. 9 - Prob. 49SGCh. 9 - Prob. 1TFCh. 9 - Prob. 2TFCh. 9 - Prob. 3TFCh. 9 - Most users today work with a command-line...Ch. 9 - Prob. 5TFCh. 9 - Prob. 6TFCh. 9 - Prob. 7TFCh. 9 - Prob. 8TFCh. 9 - Many of the first operating systems were device...Ch. 9 - Prob. 10TFCh. 9 - Prob. 11TFCh. 9 - Prob. 12TFCh. 9 - Prob. 1MCCh. 9 - Prob. 2MCCh. 9 - Prob. 3MCCh. 9 - A _____operating system allows two or more...Ch. 9 - Prob. 5MCCh. 9 - Prob. 6MCCh. 9 - Prob. 7MCCh. 9 - Prob. 8MCCh. 9 - firmware a. operating system problem that occurs...Ch. 9 - Prob. 2MCh. 9 - thrashing a. operating system problem that occurs...Ch. 9 - Prob. 4MCh. 9 - drive a. operating system problem that occurs when...Ch. 9 - Prob. 6MCh. 9 - Prob. 7MCh. 9 - Prob. 8MCh. 9 - icons a. operating system problem that occurs when...Ch. 9 - Prob. 10MCh. 9 - Prob. 2CTCh. 9 - Prob. 3CTCh. 9 - Prob. 4CTCh. 9 - What is a cross-platform application?Ch. 9 - Prob. 6CTCh. 9 - Prob. 7CTCh. 9 - Prob. 8CTCh. 9 - Prob. 9CTCh. 9 - Prob. 10CTCh. 9 - Prob. 11CTCh. 9 - Prob. 12CTCh. 9 - Prob. 13CTCh. 9 - Prob. 14CTCh. 9 - Prob. 15CTCh. 9 - Prob. 16CTCh. 9 - Prob. 17CTCh. 9 - Prob. 18CTCh. 9 - Prob. 19CTCh. 9 - Prob. 20CTCh. 9 - Prob. 21CTCh. 9 - Prob. 22CTCh. 9 - Prob. 23CTCh. 9 - Prob. 24CTCh. 9 - Prob. 25CTCh. 9 - Prob. 26CTCh. 9 - Prob. 27CTCh. 9 - Prob. 28CTCh. 9 - Prob. 29CTCh. 9 - Prob. 1PSCh. 9 - Prob. 2PSCh. 9 - Prob. 3PSCh. 9 - Prob. 4PSCh. 9 - Prob. 5PSCh. 9 - Prob. 6PSCh. 9 - Prob. 7PSCh. 9 - Prob. 8PSCh. 9 - Prob. 9PSCh. 9 - Prob. 10PSCh. 9 - Prob. 11PSCh. 9 - Prob. 1.1ECh. 9 - Prob. 1.2ECh. 9 - Prob. 1.3ECh. 9 - Prob. 2.1ECh. 9 - Prob. 2.2ECh. 9 - Prob. 2.3ECh. 9 - Prob. 3.1ECh. 9 - Prob. 3.2ECh. 9 - Prob. 3.3ECh. 9 - Prob. 4.1ECh. 9 - Prob. 4.2ECh. 9 - Prob. 4.3ECh. 9 - Prob. 5.1ECh. 9 - Prob. 5.2ECh. 9 - Prob. 5.3ECh. 9 - Prob. 1IRCh. 9 - Prob. 2IRCh. 9 - Prob. 3IRCh. 9 - Prob. 4IRCh. 9 - Prob. 5IRCh. 9 - Prob. 1CTQCh. 9 - Prob. 2CTQCh. 9 - Prob. 4CTQ
Knowledge Booster
Background pattern image
Similar questions
Recommended textbooks for you
Text book image
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Text book image
Microsoft Windows 10 Comprehensive 2019
Computer Science
ISBN:9780357392607
Author:FREUND
Publisher:Cengage