Preview

Unit 7 P3 Research Paper

Powerful Essays
Open Document
Open Document
1234 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 7 P3 Research Paper
P3 – explain the purpose of different software utilities
Virus protection – virus protection protects a computer system from malicious viruses and Trojans and worms which you can be infected by through the internet or email or downloading files or through a USB flash drive etc. virus protection usually consists of a firewall, virus scanner, virus remover and spyware. With virus protection you can perform a scan on your computer to check if you have been infected by any viruses or Trojans or worms. With some virus protections software’s you can scan your computer then it will ask you if you want the viruses removed, also if any programs have been infected the virus protection will ask you if you want the infected program deleted, most virus
…show more content…
There are two types of firewalls, hardware firewalls and software firewalls. Software firewalls provide another coating of security, software firewalls prohibit malware on your computer from being sent to others. Hardware firewalls treat any kind of traffic from travelling from a local network out to the internet as safe. An example of a threat entering your computer could be, you visit a website that contains a hidden malicious program that’s designed to secretly install itself on your machine and then send information out via the internet, this maybe to steal personal information, this is one method of infection. It is very dangerous to operate the internet without a firewall because then you will not be notified if a malicious program is trying to enter your computer and if you do not have a firewall it will not be able to protect you from malicious programs that will damage your computer. A hardware firewall is a physical device that connects to a computer and is configurable through connection to it or either through using the internet browser or through a command line

You May Also Find These Documents Helpful

  • Good Essays

    Routing is the methodology of selecting way or path in a system and also to send network traffic in this path or way and route is the way to send the system traffic. There are two types of routes. One is static routing and other…

    • 1266 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 9 Exam Paper

    • 486 Words
    • 2 Pages

    For QAM, each carrier is ASK modulated. The two independent signals are simultaneously transmitted and at the receiver, the two signals are demodulated, and the results combined to produce the original binary input.…

    • 486 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Network Attached Storage (NAS) is a type of file-level storage device which is dedicated and designed to provide users with fast and secure access to their data at all times over LAN and Ethernet connections. NAS’s are normally a specialized computer built to store and serve files quickly. The Capacity for NAS’s is limitless. Low end Network Attached Storage units start at around $300 and can store over 5 Terabytes. The Picture on the right is of a Netgear ReadyNAS 312 RN31200 and can hold 8TB.…

    • 291 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Indeed, Santa Claus is coming to town. Only this time, he's a "Secret Santa" in the form of a casino online video slot game provided by Microgaming. It's hard to imagine there would be slot players who won't enjoy playing the Secret Santa slot, even if it's only during the holiday season. Since the jackpots and excitement exist year-round, it makes perfect sense this game should be considered a keeper 365 games a year.…

    • 605 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    For Visual Basic a variable’s name must have a letter as the first character, you cannot use spaces, periods, or other special characters such as !@#. The name cannot exceed 255 characters. The variable should not have a similar name as the functions, statements, and methods, and the name cannot be repeated within the scope. This language is not case sensitive.…

    • 333 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    192.168.1.1, this may seem like an ordinary IP address. However it is not so ordinary. This is the IP address used by several network brands like Linksys and others as an access point. This IP serves as a WLAN to route the requests of sevreal routers. The routers’ admin access needs to be configured on this IP address. By doing this configuration firms allow the network administrators to configure the networks and routers owned by them. This IP is used for several purposes which include – managing security options, IP QoS, DSL, ADSL, Network management, DNS, LAN, WAN, proxy, WLAN settings, MAC, WPS block and several other options.…

    • 570 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Network attached storage (NAS) is basically a server that acts as hard drive that’s attached to a network (Johnson). This connection to a network allows anyone who is also connected to the network the ability to access the hard drive. The NAS come in many sizes and different capabilities. The network connection that the NAS uses can be almost any that are available. The standard Ethernet connection is the most common connection by there are also systems that use a wireless connection or even a fiber optic connection for extremely fast transfer speeds.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    Firewalls are hardware or software-based network security system that controls the outgoing and incoming network traffic by analyzing the data packets and determining whether they should be allowed through or not based upon the settings. A firewall establishes a barrier between a trusted, secure internal network and another network that is not assumed to be secure and trusted. Many computers and other hardware such as routers and modems have built-in firewall capabilities. These firewalls can be effective with little or no configuration. Software firewalls can be installed on your computer and can be configured according to your needs. Many software firewalls have user defined controls for setting up safe file and printer sharing and to block unsafe applications from running on your computer. Software firewalls may also incorporate privacy controls and web content…

    • 498 Words
    • 2 Pages
    Good Essays
  • Good Essays

    It is major to see that private broadband speed ask for has an immensely fluctuating character. Families move stunningly in their centrality of usage, the kind of occupations they use their relationship for and the measure of progress these applications make. In this consider, we address this respectable mix by constraining between different groupings of customers, and our general outcomes are midpoints over these outlines. While the advance of the intensity for exchange speed is related to that of download speeds, their improvements are not by any associate of the creative vitality poorly characterized. Despite phenomenal things, download speeds are from time to time more desperate to customers as they are dependably holding up to use substance or use an application, while they are normally less squashed while exchanging data.…

    • 626 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Write a 1,050- to 1,400-word paper in which you identify three barriers to services, planning, funding, or empowerment in a selected aspect of human services. How does community development help address these barriers? Discuss how applications of technology could be utilized as a means to overcome each of these barriers. Include at a minimum the applications that utilize word processing, presentation, spreadsheet, database, and report generating applications. You may also include communications software, media such as video, and other types of technology in your discussions. Format your paper consistent with APA guidelines.…

    • 436 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    A firewall restricts access to your network by filtering and blocking packets based on the sender's and receiver's Internet Protocol addresses. A proxy firewall acts as an intermediary between a client and a server, and it retrieves information and sends to the client. A proxy firewall uses stateful inspection technology to monitor incoming information and restricts network packets through the firewall. A firewall uses network address translation or NAT to assign IP addresses to each device which is connected to your network and makes it harder for hackers to break the network security.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Nt1310 Unit 3

    • 541 Words
    • 3 Pages

    A firewall is a network security hardware and/or software program that is used to control the flow of traffic into and out of a network or computer. When a computer has firewall protection the flow of data is monitored and filtered. Also, firewalls are barriers to unauthorized access; for example, when a person or program requests access to a network it must first get authorization and verification from the firewall and user. Furthermore, firewalls help protect networks from hackers, viruses, and other malicious digital security risks. Finally, a firewall ensures that our computers are not sending dangerous data to outside networks.…

    • 541 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Bshs 345 Research Paper

    • 377 Words
    • 2 Pages

    Review the article by Laura Smith, Pamela F. Foley, and Michael P. Chaneyin the reserved readings section. Prepare a 2 page where you describe the differences between Classism, Ableism, and…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Term Paper

    • 395 Words
    • 2 Pages

    victims age means how old the person was when he or she was abused as a child. For instance, some victims ages can be…

    • 395 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Starting with the first action, installing firewalls and anti-virus, the article "Firewalls" goes in-depth about how these are important here "While firewalls filter and limit incoming transmission of data that tries to access the system, anti-virus software looks at how the data affects your system". This shows why it's critical to have both a firewall and anti-virus software installed. If you install only a firewall then as soon as its been breached, whoever invaded your system has access to all of your files and personal info with no anti-virus to stop them. It's the same for firewalls, if you are without one, the virus can access your device much easier than a device with both anti-virus and a firewall installed. It's very important to have both installed for maximum security to deter hackers, scammers, and spy…

    • 601 Words
    • 3 Pages
    Good Essays