Measures for Securing E-Mail and Instant Messaging Video 2
* [Show Transcript] DO NOT RESPOND TO UNSOLICITED COMMERCIAL MAIL.
You may receive a number of unwanted e-mail messages from unknown senders
including individuals and companies that are advertising their products or
services. These messages may also be in the form of online surveys that
require you to fill up personal information. These unsolicited messages are
known as junk mail or spam.
Junk mail can often include content that is harmful for your computer. In
addition, junk mail is often used for stealing identities, and you might
accidentally share sensitive information while responding to such messages.
Therefore, you should avoid replying to junk mail. You should also delete
junk mail whenever you receive it. E-mail programs, such as Windows Mail,
include a junk mail folder to which the junk mail may be directed and later
Small program that gets installed on a computer while browsing the
Internet. The basic function of active content is to provide an interactive
Internet experience through videos and toolbars. Sometimes, active content
is used to gain unauthorized access to a computer, and then damage the data
stored on it or install malicious software on it.
To make a duplicate copy of a program, a disk, or data. The duplicate copy
is called a backup.
Temporary memory on your computer that is sometimes used to store local
copies of files opened when you browse the Internet.
Keeping a user
Log in to save your progress and obtain a certificate in Alison’s free Microsoft Digital Literacy - IT Basics, Internet & Productivity Programs online course
Sign up to save your progress and obtain a certificate in Alison’s free Microsoft Digital Literacy - IT Basics, Internet & Productivity Programs online course
Please enter you email address and we will mail you a link to reset your password.