subject

Project: Putting Your Computer Skills to the Test Your next door neighbor knows that you know a lot of about computers, so he or she calls you one day to tell you that his computer is acting funny. It is running slowing and his web browser seems to take him or her to sites with which he or she is unfamiliar. He or she asked you to come and look at his or her computer and see if you can fix it.

Using a computer in the lab or your own computer loaded with Windows, go through the steps of setting up and running Windows Defender to identify what is causing the problem. Play around with the settings and see if that makes any differences as your work through the programs. Write a list of the standard settings and explain why you think they are the defaults. Be as specific as you can about types of spyware, how this antispyware program works, and what specific threat each setting is designed to counter.
On that same computer, using the System and Security section in Windows, identify the antivirus software used on this computer. Review the standard (recommended) settings and then look through the options of configuring your own settings. Write a list of the standard settings and explain why you think these are the defaults. Be as specific as you can about types of viruses, how this antivirus program works, and what specific threat each setting is designed to counter.
Do some research online and identify the top five spyware programs or threats out there today, by name and type, and the top five virus threats out there today, by name and type.

Compile the information from each of the three sections into a report to submit to the instructor. This report should be at least 1, 200 words in length. It should contain bullet points and narrative text, and you can include up to three graphical elements if they help the report.
Submission Requirements

Use standard English and write full phrases or sentences. Do not use texting abbreviations or other shortcuts.
Make any tables, charts, or graphics neat and well organized.
Make the information easy to understand.

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 18:40
Access defaults to searching for information on the
Answers: 1
question
Computers and Technology, 22.06.2019 09:40
It is vital to research each of the services you plan to disable before implementing any change, especially on critical machines such as the: a. servers in the test environment. b. domain controller and other infrastructure servers. c. desktops that have previously been attacked. d. desktops used by upper-level management.
Answers: 2
question
Computers and Technology, 23.06.2019 02:00
Arecipients list has been loaded into a document. which commands should be clicked in order to filter the list so that letters will not be printed for recipients who live in a certain state? mailings tab, start mail merge, select recipients, type new list, then insert only contacts from the desired states mailings tab, rules, select recipients, use existing list, then choose a recipients list that includes only contacts in certain states mailings tab, select recipients, use existing list, rules, fill in, then type in certain states mailings tab, rules, skip record select β€œstate” under field name, then type in the state name under β€œequal to”
Answers: 2
question
Computers and Technology, 23.06.2019 07:00
Why is investing in a mutual fund less risky than investing in a particular company's stock? a. mutual funds only invest in blue-chip stocks. b. investments in mutual funds are more liquid. c. mutual funds hold a diversified portfolio of stocks. d. investments in mutual funds offer a higher rate of return.
Answers: 2
You know the right answer?
Project: Putting Your Computer Skills to the Test Your next door neighbor knows that you know a lot...
Questions
question
Mathematics, 12.07.2019 06:30
question
Mathematics, 12.07.2019 06:30
Questions on the website: 13722360