This preview shows pages 1–3. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: T1-2Plug-In T1Personal Productivity Using IT*P L U G - I NT1Personal Productivity Using IT1.Describe the four steps you can use to create a strong password.2.Identify three tips you can use to manage your files.3.Explain why you would use Microsoft’s backup and recovery utility.4.Describe the six common e-mail mistakes.5.Explain spam and phishing and identify three ways that you can prevent each.6.Explain the primary uses of spyware and adware.7.Identify three things you can do to maintain your computer and keep it runningsmoothly.8.Explain why you would install anti-virus protection software.9.Describe the need for a personal firewall.IntroductionA number of things can be done to keep a personal computer running smoothlyand to protect it from such things as spyware and identity theft (see Figure T1.1). Afew of these important items are covered in this plug-in, including:Creating strong passwords.Performing good file management.Implementing effective backup and recovery strategies.Using Zip files.Writing professional e-mails.Stopping spam.Preventing phishing.Detecting spyware.Restricting instant messaging.Increasing PC performance.LEARNING OUTCOMESPlug-In T1Personal Productivity Using ITT1-3*Using anti-virus software.Installing a personal firewall. Creating StrongPasswordsIf you have ever lost your wallet or your purse,you know the sense of vulnerability thatcomes with it. Someone might be walkingaround with your identification, pretendingto be you. If someone stole your passwords,he could do the same thing online. A hackercould be opening new credit card accounts,applying for mortgages, or chatting onlinedisguised as you—and you would not know it until it was too late.You probably already know not to create passwords using any combination ofconsecutive numbers or letters such as “12345678,” “lmnopqrs,” or adjacent let-ters on your keyboard such as “qwerty.” In addition, never use your log-in name,your pet’s name, or your birthday, or a word that can be found in the dictionary asa password. Hackers use sophisticated tools that can rapidly guess passwordsbased on words in the dictionary in different languages, even common wordsspelled backward.If you use a common word as your password, you might think you are protectedif you replace letters of that word with numbers or symbols that look like the letterssuch as M1cr0$0ft or [email protected] Unfortunately, hackers know these tricks too. Thefollowing are four steps you can use to create strong passwords:1.Create strong passwords that you can remember.2.Keep your passwords a secret.3.Manage your passwords.4.Monitor your accounts.CREATE STRONG PASSWORDS THAT YOU CAN REMEMBERYou could come up with a completely random combination of numbers and sym-bols for a password, but that is not very practical. How would you remember it?...
View Full Document
This note was uploaded on 06/05/2011 for the course BUAD 3050 taught by Professor Moni during the Spring '10 term at Toledo.
- Spring '10