It heavily depends on software installed on them.
For example, computers with Windows installed aren't very secure, unless they have a firewall and antivirus installed.
Linux is secure, unless somebody configures it to not be secure.
BSD is security-oriented, so it's very secure.
As for hardware - not very much, since one can take out a hard disk and read it elsewhere, boot a LiveCD/DVD and crack local password, etc.
i do not know okay wow
No. Computer process (input) information into (output) data.
Information Technology
Sure, information system is the main , core issue for the computer specialist
For information on GIGO in computers, see the related question "What does GIGO mean?". For information on computer bugs, see the related question "What are computer bugs?".
Everything on your computer should be protected by a firewall and anti virus software. Personal information and files should be password protected. Passwords should not be stored on the computer.
If you computer and network is not protected, then yes, there is that possibility.
The person that initially set the computer up created that account name. The name signifies that the account is protected against security risks. For more information on computer security visit Answers.com
The code is protected as a literary work.
it will kill our computer
Computer security refers to be protected from the viruses present inside your computer whereas Internet security refers to be protected from the malwares those could attack your computer through Internet.
It is protected by FERPA laws
Temperature
you dont
Computer Fraud & Abuse Act
TITLE 18 > PART I > CHAPTER 47 > § 1030Prev | Next(5)(A) knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage without authorization, to a protected computer;(B) intentionally accesses a protected computer without authorization, and as a result of such conduct, recklessly causes damage; or(C) intentionally accesses a protected computer without authorization, and as a result of such conduct, causes damage and loss
PHI- Protected Health Information EPHI- Protected Health Information in Electronic form