SlideShare a Scribd company logo
1 of 16
10.1
[object Object],[object Object],[object Object],THREAT TO COMPUTERS
THREATS INCLUDE ,[object Object],[object Object],[object Object],[object Object]
VIRUS ,[object Object],[object Object],[object Object]
VIRUS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ANTI-VIRUS SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
POWER FLUCTUATION ,[object Object],[object Object]
DUST ,[object Object],[object Object]
RODENTS ,[object Object]
THREATS TO COMPUTER USERS ,[object Object],[object Object],[object Object],[object Object]
POSTURE ,[object Object],[object Object]
VISION ,[object Object]
RESPONSIBLE USE OF COMPUTERS ,[object Object],[object Object]
THESE INCLUDE: ,[object Object],[object Object],[object Object]
COPYRIGHT ,[object Object]
PRIVACY CONCERN ,[object Object],[object Object]

More Related Content

Viewers also liked

Driven By Power. Journal of Images
Driven By Power. Journal of ImagesDriven By Power. Journal of Images
Driven By Power. Journal of Imagesmpaulmarc
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShareSlideShare
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShareSlideShare
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShareSlideShare
 

Viewers also liked (8)

Form 1 Term 1 Week 12.1
Form 1   Term 1  Week 12.1Form 1   Term 1  Week 12.1
Form 1 Term 1 Week 12.1
 
Form 1 Term 1 Week 11.1
Form 1   Term 1  Week 11.1Form 1   Term 1  Week 11.1
Form 1 Term 1 Week 11.1
 
Form 1 Term 1 Week 8.2
Form 1   Term 1  Week 8.2Form 1   Term 1  Week 8.2
Form 1 Term 1 Week 8.2
 
Driven By Power. Journal of Images
Driven By Power. Journal of ImagesDriven By Power. Journal of Images
Driven By Power. Journal of Images
 
L A2 Cpu
L A2 CpuL A2 Cpu
L A2 Cpu
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShare
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
 

Similar to Form 1 Term 1 Week 10.1

Similar to Form 1 Term 1 Week 10.1 (20)

Computer presentation
Computer presentationComputer presentation
Computer presentation
 
14 - Computer Security.pdf
14 - Computer Security.pdf14 - Computer Security.pdf
14 - Computer Security.pdf
 
COMPUTER STUDIES by Lefela Matinkane
COMPUTER STUDIES by Lefela Matinkane COMPUTER STUDIES by Lefela Matinkane
COMPUTER STUDIES by Lefela Matinkane
 
Computer
Computer Computer
Computer
 
CMP 3204 P-A (Lefela).pptx
CMP 3204 P-A (Lefela).pptxCMP 3204 P-A (Lefela).pptx
CMP 3204 P-A (Lefela).pptx
 
Green computing
Green computingGreen computing
Green computing
 
Health hazards of using computer
Health hazards of using computerHealth hazards of using computer
Health hazards of using computer
 
Discovering Computer Chapter 1
Discovering Computer Chapter 1Discovering Computer Chapter 1
Discovering Computer Chapter 1
 
INTRODUCTION TO COMPUTER.pptx
INTRODUCTION TO COMPUTER.pptxINTRODUCTION TO COMPUTER.pptx
INTRODUCTION TO COMPUTER.pptx
 
The Effects of ICT
The Effects of ICTThe Effects of ICT
The Effects of ICT
 
The Effects Of Ict
The Effects Of IctThe Effects Of Ict
The Effects Of Ict
 
Health & Safety
Health & SafetyHealth & Safety
Health & Safety
 
GUIDE HARDWARE AND SOFTWARE MAINTENANCE English
GUIDE HARDWARE AND SOFTWARE MAINTENANCE EnglishGUIDE HARDWARE AND SOFTWARE MAINTENANCE English
GUIDE HARDWARE AND SOFTWARE MAINTENANCE English
 
Manual en ingles
Manual en  inglesManual en  ingles
Manual en ingles
 
Manual en ingles
Manual en  inglesManual en  ingles
Manual en ingles
 
Manual en ingles
Manual en  inglesManual en  ingles
Manual en ingles
 
Computer safety
Computer safetyComputer safety
Computer safety
 
Computer basic operations
Computer basic operationsComputer basic operations
Computer basic operations
 
ICT
ICTICT
ICT
 
impact.pptx
impact.pptximpact.pptx
impact.pptx
 

More from Harley Greenberg (20)

Form 1 Term 2 Week 1.3
Form 1   Term 2   Week 1.3Form 1   Term 2   Week 1.3
Form 1 Term 2 Week 1.3
 
Form 1 Term 3 Week 3.2
Form 1   Term 3   Week 3.2Form 1   Term 3   Week 3.2
Form 1 Term 3 Week 3.2
 
Form 1 Term 3 Week 3.3
Form 1   Term 3   Week 3.3Form 1   Term 3   Week 3.3
Form 1 Term 3 Week 3.3
 
Form 1 Term 3 Week 2.3
Form 1   Term 3   Week 2.3Form 1   Term 3   Week 2.3
Form 1 Term 3 Week 2.3
 
Form 1 Term 3 Week 2.2
Form 1   Term 3   Week 2.2Form 1   Term 3   Week 2.2
Form 1 Term 3 Week 2.2
 
Form 1 Term 2 Week 4.3
Form 1   Term 2   Week 4.3Form 1   Term 2   Week 4.3
Form 1 Term 2 Week 4.3
 
Form 1 Term 2 Week 4.2
Form 1   Term 2   Week 4.2Form 1   Term 2   Week 4.2
Form 1 Term 2 Week 4.2
 
Form 1 Term 2 Week 5.1
Form 1   Term 2   Week 5.1Form 1   Term 2   Week 5.1
Form 1 Term 2 Week 5.1
 
Form 1 Term 2 Week 5.2
Form 1   Term 2   Week 5.2Form 1   Term 2   Week 5.2
Form 1 Term 2 Week 5.2
 
Form 1 Term 2 Week 5.3
Form 1   Term 2   Week 5.3Form 1   Term 2   Week 5.3
Form 1 Term 2 Week 5.3
 
Form 1 Term 2 Week 6.0
Form 1   Term 2   Week 6.0Form 1   Term 2   Week 6.0
Form 1 Term 2 Week 6.0
 
Form 1 Term 2 Week 6.1
Form 1   Term 2   Week 6.1Form 1   Term 2   Week 6.1
Form 1 Term 2 Week 6.1
 
Form 1 Term 2 Week 6.2
Form 1   Term 2   Week 6.2Form 1   Term 2   Week 6.2
Form 1 Term 2 Week 6.2
 
Form 1 Term 2 Week 6.3
Form 1   Term 2   Week 6.3Form 1   Term 2   Week 6.3
Form 1 Term 2 Week 6.3
 
Form 1 Term 3 Week 2.1
Form 1   Term 3   Week 2.1Form 1   Term 3   Week 2.1
Form 1 Term 3 Week 2.1
 
Form 1 Term 2 Week 3.1
Form 1   Term 2   Week 3.1Form 1   Term 2   Week 3.1
Form 1 Term 2 Week 3.1
 
Form 1 Term 2 Week 3.2
Form 1   Term 2   Week 3.2Form 1   Term 2   Week 3.2
Form 1 Term 2 Week 3.2
 
Form 1 Term 2 Week 3.3
Form 1   Term 2   Week 3.3Form 1   Term 2   Week 3.3
Form 1 Term 2 Week 3.3
 
Form 1 Term 2 Week 4.1
Form 1   Term 2   Week 4.1Form 1   Term 2   Week 4.1
Form 1 Term 2 Week 4.1
 
Form 1 Term 2 Week 2.1
Form 1   Term 2   Week 2.1Form 1   Term 2   Week 2.1
Form 1 Term 2 Week 2.1
 

Recently uploaded

WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 

Recently uploaded (20)

Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 

Form 1 Term 1 Week 10.1

  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.