首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 156 毫秒
1.
《计算机与网络》2005,(10):50-50
由于网络的发展,用户电脑面临的黑客攻击问题也越来越严重,对于新手应该如何防范电脑病毒呢?  相似文献   

2.
针对目前电脑病毒的传播途径,电脑使用者可谓想尽各种招数来预防,但是电脑病毒无孔不入,稍有疏忽,你的电脑就有中招的可能。一旦中招,有时即便用最新的杀毒软件也无济于事。对于一些难以清除的电脑病毒该如何根除呢,这就是本文要为大家回答的问题。  相似文献   

3.
电脑产生后不久,电脑病毒也开始随之曼延,特别是现在网络的广泛使用,让电脑病毒更加猖獗。那么我们怎样了解电脑是否中了病毒?中了什么样的病毒呢?  相似文献   

4.
安装电脑病毒扫瞄软件1 如金山毒霸,瑞星,这类软件可常驻系统,随时扫瞄一切电脑病毒及木马程序,确保电脑的健康及安全.但一定要经常上网更新病毒资料。经常定时使用维护向导2 维护向导是的新增程序,主要是做一些电脑内部档案修复及重排的工作。电脑用了一段日子,内部的  相似文献   

5.
《计算机与网络》2007,(14):38-38
近日发布的《瑞星2007上半年中国大陆地区电脑病毒疫情&互联网安全报告》显示,上半年全国共有3500多万台电脑曾经被病毒感染。占到上网电脑数量的一半以上。中国大陆地区已经成为全球电脑病毒危害最严重的地区。  相似文献   

6.
上回电脑还用得好好的,这回开机时电脑启动不了了,这有可能是电脑病毒在捣鬼。或者,杀毒软件发现了病毒,却清除不了,甚至以安全模式启动windows也不能够将病毒杀掉。当你遇到这样的电脑病毒问题时,瑞星的LINUX引导杀毒U盘就可以发挥它的用武之地了。  相似文献   

7.
电脑属于高科技产品,使用电脑需要一定的专业知识,否则不仅不能充分发挥电脑的应有作用,反而会造成难以预料的损失。文中首先探讨电脑病毒的危害及防范措施;接着阐述合理选择与设置显示器和正确维护显示器的方法;最后列举19种方法用于防范电脑的死机故障。  相似文献   

8.
电脑病毒是一种人为设计的、具有类似于人类病毒传染特性的、有很强破坏力的电脑程序。电脑病毒通常都有一个感染、潜伏、发作的过程,只有当某个特定的条件满足时才会爆发。如名为“米开朗基罗”(亦称米氏病毒)的病毒必须在电脑内部时钟运行到3月6日时才开始破坏电脑硬盘上的数据;而“黑色星期五”病毒的发作条件是日期为13日并且同时又是星期五。因为,电脑本身不会自己滋生出病毒,病毒程序也只有被运行时才繁衍、传染。所以,对于没有联网操作的单台电脑来讲,感染病毒的唯一途径就是使用了已带有电脑病毒的“不洁”软盘或光盘。自从发…  相似文献   

9.
电脑病毒——听过吧,这是大多数电脑使用者再熟悉不过的名词了。也许有些人从来没遇到过病毒,但病毒对电脑的危害性绝对不能轻视,在电脑和网络都如此普及的今天,即使你不是一个电脑高手,也应该了解一些电脑病毒的基础知识。  相似文献   

10.
数字     
《计算机安全》2009,(7):I0001-I0001
20083015台 6月11日,国内信息网络安全厂商金山软件正式发布《2009年5月份中国电脑病毒疫情及互联网安全报告》。报告显示,2009年5月份,新增电脑病毒、木马2389476个,较上月增长38%,病毒、木马感染电脑数量为20083015台次,也有较大增长。  相似文献   

11.
Extensive development in universities’ provision of computer facilities may have negative consequences for students prone to computer avoidance. In the present study, undergraduates (N = 363) completed self-report measures on computer phobia and self-efficacy. Results demonstrate that many students follow previous trends by continuing to report levels of computer phobia within the higher parameters of self-report measures. Students who reported either high computer phobia or low computer self-efficacy were less likely to maximise their use of university computer facilities. Moreover, a range of background measures – initial computer experience, regular home use, successful completion of a computer course and introductory tutor’s characteristics – all impacted statistically on self-report responses. Results are discussed with reference to the increasing responsibility placed on students to acquire ICT skills.  相似文献   

12.
Assessing the computer attitudes of students: An Asian perspective   总被引:2,自引:2,他引:0  
Research has found that computer attitudes play a key role in influencing the extent to which students accept the computer as a learning tool and in determining the likelihood that computer will be used in the future for learning and study. A sample of 183 students reported their computer attitudes using a Likert-type questionnaire with three subscales, computer importance, computer enjoyment, and computer anxiety. One-way MANOVA revealed no significant differences in computer attitudes by gender although male students reported more positive towards the computer than female students. There were significant differences between students who own computers at home and those who do not and students who own a computer at home also reported a lower level of computer anxiety compared to those who do not.  相似文献   

13.
The importance and use of computers has increased dramatically over the last two decades. The Attitudes Towards Computer Usage Scale (ATCUS) was developed in 1986 [Popovich, P. M., Hyde, K. R., Zakrajsek, T., & Blumer, C. (1987). The development of the attitudes toward computer usage scale. Educational and Psychological Measurement, 47, 261–269.] and used in a variety of settings over the years. In order to examine how computer attitudes have changed from 1986 to 2005, the ATCUS was given to 254 male and female current undergraduate students. When comparing the 1986 with 2005 results, the amount of time spent using a computer was still positively related to computer attitudes; however, the number of college computer courses was not. There is no longer a significant relationship among any of the factors with college computer courses. Males and females no longer significantly differ in their attitudes toward computers, number of college computer courses, amount of time spent using computers, or degree of self-reported computer anxiety. Implications are discussed.  相似文献   

14.
本文分析指出了高校计算机教育存在的问题,强调了大学生培养计算机能力的重要性,提出了大学生计算机能力培养的措施。  相似文献   

15.
Since the beginning of computerization, it has been of interest whether there are differential effects on computer behavior, in particular in terms of computer access, computer use, and motivational variables, such as computer self-efficacy. The current research addresses the questions if the gender-related differences in this respect persist to the present day and if there is also a difference in actual performance characteristics. A sample of 48 university students (23 male) was administered a technology self-efficacy questionnaire, a survey on computer access, recorded a user diary, and turned in a computer task. Results show that the gender gap is closing as far as computer access and self-efficacy are concerned. Also, female and male students report comparable amounts of computer usage for their studies. User behavior appears to be gender-specific as males spend more time at the computer for personal purposes. There is also some evidence that male students outperform female students at a computer task (remastering of Power-Point slides). Conclusions for creating computer-based learning environments are discussed.  相似文献   

16.
计算机技术正以惊人的速度发展着,更新换代之快令人应接不暇。但是,以传统的、数字计算为基础的电子计算机,在其研究与发展的技术理论与技术手段上,存在着诸多限制,严重阻碍着计算机的未来发展。本文从现在电子计算机的发展现状与未来分析着手,从量子计算机、生物计算机两个方面,分析了计算机研究开发领域中的未来发展趋势。  相似文献   

17.
This study’s purpose was to provide additional psychometric data on the Computer Aversion, Attitudes, and Familiarity Index (CAAFI). The CAAFI is comprised of 40 items, yielding a total score and four factor scores with 10 items each (one familiarity, one attitudes, two aversion). The measure was administered to a sample of undergraduate psychology students (N = 293) along with the Computer Understanding and Experience Scale, the Computer Attitude Scale, and the Computer Aversion Scale. The factor structure of the CAAFI was supported via confirmatory factor analytic procedures and analysis of internal consistency reliability coefficients. In relation to the other measures of computer-related constructs, the strongest validity support was found for the CAAFI total score and Factors 1 (computer familiarity) and 3 (computer aversion-discomfort), followed by Factor 2 (computer attitudes). With regard to Factor 4 (computer aversion-fear), given the results of the analyses the decision was made to remove these items from the CAAFI in order to enhance the measure’s psychometric properties and practical utility.  相似文献   

18.
随着计算机和互联网技术的发展,各种计算机犯罪案件也随之增多。计算机犯罪不仅会造成财产损失,还会危及国家和公共安全,远比传统犯罪的危害性大得多,因此计算机取证在司法鉴定中占据越来越重要的位置,计算机取证的主要环节就是数据恢复,本文就数据恢复技术在计算机取证方面的应用作一个初步的探索。  相似文献   

19.
An analysis will be made on 95 cases of computer fraud and over 60 cases of computer crime reported in the U.K. from various private and public sources to establish the pattern of abuse and the modus operandi in various crime perpetration — who are the victims, who are the computer criminals, size of loss, penalties and detection and lessons learnt from the reported cases.The paper moves on to discuss the various options of risk control and crime prevention, risk analysis and business impact review, and how to set a budget for control of abuse.The paper closes with a discussion of the future implications from the proliferation of personal computers, office systems and distributed processing. What advantages would the future criminal gain from these activities? What would the auditor or security manager have to do to combat the potential new crime wave?  相似文献   

20.
计算机取证面临的问题及发展趋势   总被引:1,自引:0,他引:1  
分析了计算机取证面临问题的基础上探讨了计算机取证的发展趋势.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号