Measures for Securing E-Mail and Instant Messaging Video 4
*
*
* [Show Transcript] LIMIT CHAT ACTIVITY TO PEOPLE WHOM YOU KNOW.
You should limit your chat activity only to the people whom you know.
Developing communication with new and unknown individuals makes you more
vulnerable to threats such as online predators and scams. GLOSSARY
-------------------------
A
Active Content
Small program that gets installed on a computer while browsing the
Internet. The basic function of active content is to provide an interactive
Internet experience through videos and toolbars. Sometimes, active content
is used to gain unauthorized access to a computer, and then damage the data
stored on it or install malicious software on it.
-------------------------
B
Back Up
To make a duplicate copy of a program, a disk, or data. The duplicate copy
is called a backup.
-------------------------
C
Cache Memory
Temporary memory on your computer that is sometimes used to store local
copies of files opened when you browse the Internet.
Computer Privacy
Keeping a user
Log in to save your progress and obtain a certificate in Alison’s free Microsoft Digital Literacy - IT Basics, Internet & Productivity Programs online course
Sign up to save your progress and obtain a certificate in Alison’s free Microsoft Digital Literacy - IT Basics, Internet & Productivity Programs online course
Please enter you email address and we will mail you a link to reset your password.