blog




  • Essay / Personal Protection Essay - 1033

    Welcome: Hello and welcome to another issue of the Personal Protection Program. In this March edition, I'll cover computer security and in particular file extensions, viruses, social media security and protecting your online identity.1.A.)A file extension is the suffix placed at the end of a file name, which is used to make it identifiable, what format of content is kept in a file. File extensions were originally designed to help users determine which application to launch to run a program. However, devious people have used them to implement red files and viruses into the computer systems of innocent people. Always be wary of the files you run! Use these three handy steps to protect yourself... VERIFY – Always check the full file name. CREATOR – Know the creator of the file. Is it reliable or suspicious? KNOW - Know (know) if antivirus programs are installed. B.) PDF: PDF file extension stands for Portable Document Format. PDF files compress files and also support convenient downloading and printing. DOC: A doc (abbreviation for document) is a file extension for Word documents. The extension is mainly used for plain text documentation.JPG: This file extension stands for Joint Photographic Group. Its purpose is to compress digital photographic files. JPG files contain photos and especially digitally produced images, such as online artwork, purchased images with photos, and retouched images. BMP: Bitmap Image Files (BMP) store digital Bitmap images on the display device, such as a computer or tablet. Examples of Bitmap files are digital images similar to those that use the JPG file extension.C.) Changing a file extension will cause major problems for the file itself. In the middle of the paper, the information you place online. Personal information at risk includes...Full namesAddressesSchoolsPhone numbersEmail accountsFinancial information at risk includes...Credit or debit card detailsPIN numbersRemember, if you don't want it stolen, don't don't upload it!C.) Although some personal information being exposed is avoidable by not uploading it online, which is not the case for many. When paying online, personal information must be provided in order to complete payment. Therefore, other acts of protection must be implied. These include... Using payment options that protect against identity theft Deleting financial information from your computer Using complicated passwords Due to the increasingly common act of paying by smartphone, for protect yourself, make sure you have a password on your phone and don't leave personal information easily visible on your phone.