computers

posted by .

James was traveling for his job. The internet card provided by his company was not working and he had an important project due that day. James was in a small town about an hour away from the nearest internet kiosk, so he decided to drive around a nearby suburb to see if he could find a wireless system he could borrow to send out his project. James found a wireless system without a security key and, after parking near the home with the system, uploaded the project. Afterward, just for fun, James peaked into the computer on the wireless system and found, to his dismay, some bank accountsand passwords.
Write a 350-700 word paper explaining the following.
Before this class, what means, if any, were you employed to protect yourself in the cyber world?
What security measures are available to the average computer user?
What is missing from the system James borrowed?
Which do you think are more important?
How might you change your approach to online security in the future?

  • computers -

    Please note that we don't do students' homework for them. Be sure to go back into your textbook or use a good search engine. http://hanlib.sou.edu/searchtools/

    In addition, can you see all the instances of "you" in there? Only you can actually write this up. No one here knows what your experiences are.

    Once YOU have come up with attempted answers to YOUR questions, please re-post and let us know what you think. Then someone here will be happy to comment on your thinking.

Respond to this Question

First Name
School Subject
Your Answer

Similar Questions

  1. English!

    What is the relative effectiveness of Internet search engines versus searching for information in a library or searching for a product in a grocery store?
  2. Social Studies

    How do I find information on the internet about things like what is the sole right to trade in an area. Im doing a crossword and ive already looked in the book. Some other questions are A colony leader. Colonists sent to the americas …
  3. computers

    You have been hired by a small company to network six computers in one small office that will be connected directly to the Internet. The company president wants a cost effective solution that will prevent hackers from accessing the …
  4. Economics

    The Internet is forcing businesses away from traditional functions, such as distribution. The Internet effectively closes the gap between the buyer and the seller and has slowly been eliminating middlemen or intermediaries. Select …
  5. Statistics

    According to the Pew Internet &American Life Project. 75% of American adults use the internet. The Pew project authors also peported on the percentage of Americans who use the internet by age group. The data in the in the agefile group …
  6. LAN network workshop

    6. School network LAN A school wants to have their 5 computers labs with Internet connection. Each lab having 21 computers that directly connected to each other and to the Internet. Each lab is aligned vertically at each floor from …
  7. math

    Carrie can inspect a case of watches in 5 hours. James can inspect the same case of watches in 3 hours. After working alone for 1 hour, Carries stops for lunch. After taking a 40 minute lunch break, Carrie and James work together to …
  8. math

    Write a compound inequality to represent each situation. solve and check. If James is able to earn an extra $200 this weekend, his monthly income will be between $1500 and $2000 for his job at a local restaurant. What is the normal …
  9. religion

    "The Will to Believe," contains William James' response to Clifford. You are to write 200-300 words explaining James' response to Clifford's position. Be sure to include the following: 1. Explain James classification of hypotheses …
  10. Math (Statistics: Test Statistic, Proportion)

    The Pew Research Center Internet Project, conducted on the 25th anniversary of the Internet, involved a survey of 857 Internet users (Pew Research Center website, April 1, 2014). It provided a variety of statistics on Internet users. …

More Similar Questions