answersLogoWhite

0

No piece of hardware inside the computer itself actually protects a person's

information. But the malware which steals passwords, credit numbers etc. are called trojans. The operating system as well as your antivirus will deal with trojan viruses. The operating system also uses passwords and usernames which also helps protects a person's ideas, thoughts, intellectual property, documents, files etc.

User Avatar

Wiki User

11y ago

What else can I help you with?

Continue Learning about Computer Science

Why do some pictures appear as blank rectangles when sent to another persons computer?

Either the picture information did not transfer, or the other computer cannot read the file type of the images. Are the images standard JPEGs of not too large a size? Say 200kb?


What are benefits and losses of computer?

Today computer is a need in every family.Basically, computer makes a persons life easier. For students computers are used for doing course work in microsoft word.excel and powerpoint. We can also learn many new things using computer.


What service is provided by All Computers Go?

All Computers Go provides quite a number of various services to their customers. Some of these include computer check-ups to figure out if something is wrong with a persons computer and assistance in setting up a brand new computer.


What is Telise Galanis msn address?

WikiAnswers does not disclose personal information about persons famous or non-famous alike, due to privacy regulations and WikiAnswers policies.


When must a breach be reported to the U.S. Computer Emergency Readiness Team?

According to the Department of Defense (DoD) 5400.11-R, "DoD Privacy Program, a breach is defined as "actual or possible loss of control, unauthorized disclosure, or unauthorized access of personal information where persons other than authorized users gain access or potential access to such information for an other than authorized purposes where one or more individuals will be adversely affected." Each time one of the above situations happens, it must be reported to the U.S. Computer Readiness Team within one hour.

Related Questions

Ways in which information is misused?

storing incorrect information in an innocent's persons computer without their permission


Difference between computer application and IT?

computer application is just software, IT (information technology) in general is an organization, or the persons within that organization. They are totally different, apple and Apple computer!


What amendment protects an accused persons right to remain silent?

4,5,6,8,10,14


How do you buy a laptop online with another persons credit card details?

All you do is go on the website of where you would like to purchase the computer. From there, type in the information is asks of you, i.e. credit card information. But, you will need the information on hand.


Why do our personalities differ?

Different DNA and past experiences shape a persons thoughts and perceptions.


which of these best describes a new blog?

a web page with a persons thoughts about news issues


A persons thoughts emotions feelings and physical reponses are part of one system which is evidence by what?

distress


What are the 3 parts of a persons private internal world?

Thoughts Emotions/Feelings Desires/Wishes


Can disabled persons use computer effectively?

Yes


Can a surface computer uses multiple persons?

yes


How is it possible to see your thoughts?

Do a mind map. Draw out, sketch what you are thinking.It isn't directly.There are various machines that can show brain activity and a persons actions can display his or her thoughts.


My friend knows my password as my phone is sync to his computer can he look at my information?

Yes, if you sync you phone with another persons computer they can look at some of our things. Though they ma not be able to look at all the things on your phone the do have access to some.