buad 3050 Plug In 1

buad 3050 Plug In 1 - haa23684_PlugInT1.qxd 5:23 PM Page 2...

Info icon This preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
T1-2 Plug-In T1 Personal Productivity Using IT * P L U G - I N T1 Personal Productivity Using IT 1. Describe the four steps you can use to create a strong password. 2. Identify three tips you can use to manage your files. 3. Explain why you would use Microsoft’s backup and recovery utility. 4. Describe the six common e-mail mistakes. 5. Explain spam and phishing and identify three ways that you can prevent each. 6. Explain the primary uses of spyware and adware. 7. Identify three things you can do to maintain your computer and keep it running smoothly. 8. Explain why you would install anti-virus protection software. 9. Describe the need for a personal firewall. Introduction A number of things can be done to keep a personal computer running smoothly and to protect it from such things as spyware and identity theft (see Figure T1.1). A few of these important items are covered in this plug-in, including: Creating strong passwords. Performing good file management. Implementing effective backup and recovery strategies. Using Zip files. Writing professional e-mails. Stopping spam. Preventing phishing. Detecting spyware. Restricting instant messaging. Increasing PC performance. LEARNING OUTCOMES
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Plug-In T1 Personal Productivity Using IT T1-3 * Using anti-virus software. Installing a personal firewall. Creating Strong Passwords If you have ever lost your wallet or your purse, you know the sense of vulnerability that comes with it. Someone might be walking around with your identification, pretending to be you. If someone stole your passwords, he could do the same thing online. A hacker could be opening new credit card accounts, applying for mortgages, or chatting online disguised as you—and you would not know it until it was too late. You probably already know not to create passwords using any combination of consecutive numbers or letters such as “12345678,” “lmnopqrs,” or adjacent let- ters on your keyboard such as “qwerty.” In addition, never use your log-in name, your pet’s name, or your birthday, or a word that can be found in the dictionary as a password. Hackers use sophisticated tools that can rapidly guess passwords based on words in the dictionary in different languages, even common words spelled backward. If you use a common word as your password, you might think you are protected if you replace letters of that word with numbers or symbols that look like the letters such as M1cr0$0ft or [email protected] Unfortunately, hackers know these tricks too. The following are four steps you can use to create strong passwords: 1. Create strong passwords that you can remember. 2. Keep your passwords a secret. 3. Manage your passwords. 4. Monitor your accounts. CREATE STRONG PASSWORDS THAT YOU CAN REMEMBER You could come up with a completely random combination of numbers and sym- bols for a password, but that is not very practical. How would you remember it?
Image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern