Software

A:

Firewall software is commonly installed on computers in order to monitor incoming and outgoing packet requests and to block any that may be from an untrustworthy source. Firewalls and antivirus programs are the two most basic forms of computer protection.

See Full Answer
Filed Under:
  • How do you partition a hard drive in Windows 7?

    Q: How do you partition a hard drive in Windows 7?

    A: To partition a hard drive in Microsoft Windows 7, open the Disk Management tool. Select an unallocated area of the hard drive to create a new partition. Complete the partition process by specifying the volume size, volume letter and other options related to the file system.
    See Full Answer
    Filed Under:
  • What is a computer-based information system?

    Q: What is a computer-based information system?

    A: A computer-based information system, or CBIS, uses computers to collect, process, store, analyze and distribute information for a specific purpose, such as meeting a business objective. The main components of a CBIS include hardware, software, data, procedures and people.
    See Full Answer
    Filed Under:
  • What is the way to remove a trojan horse virus from your computer?

    Q: What is the way to remove a trojan horse virus from your computer?

    A: One of the simple ways to remove a Trojan horse virus from a computer is to restart the computer in Windows "Safe Mode" and then run an anti-malware application. Trojans are computer programs that are created to perform harmful and malicious actions, which include deleting, modifying and blocking data in a computer, stealing information from an infected computer or becoming part of a Trojan bot network designed to attack specific websites and take them down.
    See Full Answer
    Filed Under:
  • When was Photoshop invented?

    Q: When was Photoshop invented?

    A: The raster graphics editing software Photoshop, currently produced by Adobe Systems, was originally created in 1988 by brothers John and Thomas Knoll. The first retail version of Photoshop was released exclusively for Apple Macintosh computers in 1990.
    See Full Answer
    Filed Under:
  • What are the most current computer viruses?

    Q: What are the most current computer viruses?

    A: New viruses, worms and Trojan horse programs are identified daily. As of October 2014, McAfee and Bitdefender are two companies, of many, that maintain online virus databases. Three of McAfee's top-tracked viruses originated in 2008, 2009 and 2010. Its website has detailed, up-to-date information on the viruses that are current threats and provides instructions on how to remove them.
    See Full Answer
    Filed Under:
  • Should you use McAfee or Norton to protect your computer?

    Q: Should you use McAfee or Norton to protect your computer?

    A: According to PCMag, Norton Internet Security (2014) is slightly better than McAfee Internet Security (2014). PCMag awarded Norton an overall score of 4.5 out of 5, while McAfee received a 4 out of 5. The main difference is that Norton was given better scores for both firewall and privacy.
    See Full Answer
    Filed Under:
  • What is computer software?

    Q: What is computer software?

    A: Computer software is the programming that tells a computer what to do to make it work. This contrasts with computer hardware, which includes the visible, physical parts of the computer.
    See Full Answer
    Filed Under:
  • Why does the toolbar keep disappearing?

    Q: Why does the toolbar keep disappearing?

    A: There are a few reasons why the taskbar or toolbar in a Windows computer can disappear. The most common reasons are that the taskbar was moved or minimized or that the explorer.exe program stopped running. The latter problem is something fairly common that occurs in older operating systems and might be only fully solved by a fresh install.
    See Full Answer
    Filed Under:
  • What is an identity theft shield?

    Q: What is an identity theft shield?

    A: Identity Theft Shield is a third party consumer credit-monitoring service. The service provides three continuous services to help consumers combat against identity theft. Credit card merchants, credit unions and banks all offer this service.
    See Full Answer
    Filed Under:
  • What are some examples of utility software?

    Q: What are some examples of utility software?

    A: Utility software is used to perform basic maintenance tasks on a computer. Examples include disk utilities like defragmenters, compressors and cleaners. There are also operating system utilities such as antivirus programs, registry cleaners and system restoration programs. Internet and network connection is managed by variety of small software utilities, including firewall programs, while program installation and removal is achieved by package managers and installation clients.
    See Full Answer
    Filed Under:
  • What are some of Bill Gates' major accomplishments?

    Q: What are some of Bill Gates' major accomplishments?

    A: Bill Gates is known for starting Microsoft, the company that developed the Windows operating system, but he has many other accomplishments. In 1987, Gates became the youngest millionaire ever at the age of 31, according to a report from NPR.
    See Full Answer
    Filed Under:
  • What does the Microsoft Office Suite consist of?

    Q: What does the Microsoft Office Suite consist of?

    A: Depending on the level of Microsoft Office purchased, the suite can consist of Word, Excel, PowerPoint, OneNote, Outlook, Access, Publisher and access to OneDrive online storage. Only Office 365 Home and Office 365 Personal have all of these programs. Office 365 Home can be installed on more devices than Personal.
    See Full Answer
    Filed Under:
  • What is application software?

    Q: What is application software?

    A: Application software are computer programs that allow users to perform specific tasks. These programs are commonly referred to as "apps," and are usually completely self-contained and commercially produced.
    See Full Answer
    Filed Under:
  • What is iris scanning used for?

    Q: What is iris scanning used for?

    A: Iris scanning technology is a security measure used to identify individuals with respect to high-security applications, such as government buildings, airports, computer access, ultra-secure locations and cellphone access. Hospitals use iris scanning technology to pair mothers with infants in maternity wards. Border crossing agents match the identities of people on government watch lists with iris scans.
    See Full Answer
    Filed Under:
  • What are the standard margins for a Word document?

    Q: What are the standard margins for a Word document?

    A: The standard margins for a Microsoft Word document are 1 inch on the left and right sides of each page and 1 inch on the top and bottom of each page. Every time a new document is created in Microsoft Word, the margins are automatically set to these dimensions.
    See Full Answer
    Filed Under:
  • What are the two types of computer software?

    Q: What are the two types of computer software?

    A: The two main types of computer software are the system software and the application software. The system software provides the platform for users to install and run application software, and it's made up of multiple programs needed to run a computer system smoothly. Application programs are designed to perform specific tasks, such as word processing, video editing, spreadsheets and web browsers.
    See Full Answer
    Filed Under:
  • How does one get rid of hackers?

    Q: How does one get rid of hackers?

    A: Hackers can be avoided by taking necessary measures like having up-to-date antivirus software, strong passwords and a good firewall. There are other ways to avoid hackers as well, like avoiding phishing scams.
    See Full Answer
    Filed Under:
  • What are the types of database software?

    Q: What are the types of database software?

    A: The different types of databases include desktop, Web enabled and server. The type of database a person or company needs ultimately depends on size requirements.
    See Full Answer
    Filed Under:
  • When using a database, what is a field?

    Q: When using a database, what is a field?

    A: In a database, the field is the smallest source of input for users to enter data. For example, a field in a database may ask for a company's name, tax identification number or income. A group of many fields is called a record, and a field in a spreadsheet is known as a cell.
    See Full Answer
    Filed Under:
  • How do I remove tracking cookies from my computer?

    Q: How do I remove tracking cookies from my computer?

    A: Removing tracking cookies is a straightforward process that varies based on the Internet browser you are using. Most major programs let you manipulate the settings so that existing cookies are deleted and future cookies are blocked. Explore the Tools and Settings options for your specific program in order to delete your cookies. Then use a browser that supports Do Not Track technology and enable the DNT option.
    See Full Answer
    Filed Under:
  • What is the FBI locked computer virus?

    Q: What is the FBI locked computer virus?

    A: The FBI locked computer virus, more commonly known as the FBI Virus or FBI Moneypak Virus, is a dangerous class of malware titled "ransomware," which impedes a user from accessing different parts of his computer. It locks his computer screen and displays a message, seemingly sanctioned by the FBI, that demands payment of a fine set at varying amounts. It is capable of infecting Windows and Apple computers alike.
    See Full Answer
    Filed Under: