SlideShare ist ein Scribd-Unternehmen logo
1 von 2
No Name
Sixteenth point.
Punto 16.
No Name
19/10/2010
16) Make a report in English, about information found on the Internet.
AVG Antivirus Free Versión 2011:
Among the improvements that we can point out is faster and less resource consuming
the CPU. The 2011 version is three times faster than previous versions.
Something new that brings new Social Networking AVG Protection is dedicated to real-
time scanning shared links in social networks Facebook, MySpace, etc. Verification is
done in real time to prevent the proliferation of harmful and dangerous scripts links.
AVG Link Scanner, another component protection, make the pages found through a
search of safe or not. Compatible with Google, Yahoo, Bing and others, with this tool
know before you click on the link, if the page is reliable and should be avoided.
Instant Messengers like MSN, ICQ and Yahoo Instant Messenger are also protected with
Shield Online, a component that automatically checks files downloaded and shared.

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Virus
Virus  Virus
Virus
 
When love kills
When love killsWhen love kills
When love kills
 
Virus
VirusVirus
Virus
 
presentation on Virus
presentation on Viruspresentation on Virus
presentation on Virus
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..
 
Computer virus
Computer virusComputer virus
Computer virus
 
My Doom Worm
My Doom WormMy Doom Worm
My Doom Worm
 
Computer virus
Computer virusComputer virus
Computer virus
 
As computer virus
As computer virusAs computer virus
As computer virus
 
Virus
VirusVirus
Virus
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumar
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Assignment of virus
Assignment of virusAssignment of virus
Assignment of virus
 
Computer virus 2015
Computer virus 2015Computer virus 2015
Computer virus 2015
 
Virus
VirusVirus
Virus
 

Andere mochten auch

Andere mochten auch (20)

Trabajo segunda ley de Newton
Trabajo segunda ley de NewtonTrabajo segunda ley de Newton
Trabajo segunda ley de Newton
 
Redess!!!!!!!!!!! (1)
Redess!!!!!!!!!!! (1)Redess!!!!!!!!!!! (1)
Redess!!!!!!!!!!! (1)
 
Informatica 10 2
Informatica  10 2Informatica  10 2
Informatica 10 2
 
Punto 7 10
Punto 7 10Punto 7 10
Punto 7 10
 
Punto 11
Punto 11Punto 11
Punto 11
 
Punto 16
Punto 16Punto 16
Punto 16
 
Punto 16 report
Punto 16 reportPunto 16 report
Punto 16 report
 
Redes inventario sala de sistemas
Redes inventario sala de sistemasRedes inventario sala de sistemas
Redes inventario sala de sistemas
 
Diccionario de ingles español2 (reparado)
Diccionario de ingles español2 (reparado)Diccionario de ingles español2 (reparado)
Diccionario de ingles español2 (reparado)
 
Herramientas ofimticas
Herramientas ofimticasHerramientas ofimticas
Herramientas ofimticas
 
Punto 15
Punto 15Punto 15
Punto 15
 
Trabajo segunda ley de Newton
Trabajo segunda ley de NewtonTrabajo segunda ley de Newton
Trabajo segunda ley de Newton
 
Punto 3
Punto 3Punto 3
Punto 3
 
Punto 9
Punto 9Punto 9
Punto 9
 
Ensayo
EnsayoEnsayo
Ensayo
 
Punto 8
Punto 8Punto 8
Punto 8
 
Castellano
CastellanoCastellano
Castellano
 
Navegadores!!
Navegadores!!Navegadores!!
Navegadores!!
 
Punto 4
Punto 4Punto 4
Punto 4
 
Punto 4 herramientas ofimaticas
Punto 4 herramientas ofimaticasPunto 4 herramientas ofimaticas
Punto 4 herramientas ofimaticas
 

Ähnlich wie Punto 16

PC Maker's Support Page Succumbs To Compromise
PC Maker's Support Page Succumbs To CompromisePC Maker's Support Page Succumbs To Compromise
PC Maker's Support Page Succumbs To CompromiseTrend Micro
 
Security models of modern mobile systems
Security models of modern mobile systemsSecurity models of modern mobile systems
Security models of modern mobile systemsDivya Raval
 
The advantages of windows application development
The advantages of windows application developmentThe advantages of windows application development
The advantages of windows application developmentEffOne_Technologies
 
Windows 8
Windows 8Windows 8
Windows 8liguad1
 
Cq3210191021
Cq3210191021Cq3210191021
Cq3210191021IJMER
 
Web browsers
Web browsersWeb browsers
Web browserslearnt
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesSejahtera Affif
 
Application Software in Computer and Services.pptx
Application Software in Computer and Services.pptxApplication Software in Computer and Services.pptx
Application Software in Computer and Services.pptxJessaBejer1
 
What is Application Software?
What is Application Software?What is Application Software?
What is Application Software?DaisyJeffenYRios
 
Web design premium
Web design premiumWeb design premium
Web design premiumjeannined_1
 
How to get genuine windows 7 with low cost
How to get genuine windows 7 with low cost How to get genuine windows 7 with low cost
How to get genuine windows 7 with low cost coldfire007
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesAlireza Ghahrood
 
TLE-ICT COMPUTER SYSTEMS SERVICING DIAGNOSING COMPUTER SYSTEM
TLE-ICT COMPUTER SYSTEMS SERVICING DIAGNOSING COMPUTER SYSTEMTLE-ICT COMPUTER SYSTEMS SERVICING DIAGNOSING COMPUTER SYSTEM
TLE-ICT COMPUTER SYSTEMS SERVICING DIAGNOSING COMPUTER SYSTEMizarahmendoza
 
Trabajo de jose
Trabajo de jose Trabajo de jose
Trabajo de jose josemgg
 

Ähnlich wie Punto 16 (20)

Documento programa avg anti
Documento programa avg antiDocumento programa avg anti
Documento programa avg anti
 
Browsers
BrowsersBrowsers
Browsers
 
PC Maker's Support Page Succumbs To Compromise
PC Maker's Support Page Succumbs To CompromisePC Maker's Support Page Succumbs To Compromise
PC Maker's Support Page Succumbs To Compromise
 
Browsers
BrowsersBrowsers
Browsers
 
Browsers
BrowsersBrowsers
Browsers
 
Security models of modern mobile systems
Security models of modern mobile systemsSecurity models of modern mobile systems
Security models of modern mobile systems
 
The advantages of windows application development
The advantages of windows application developmentThe advantages of windows application development
The advantages of windows application development
 
Windows 8
Windows 8Windows 8
Windows 8
 
Cq3210191021
Cq3210191021Cq3210191021
Cq3210191021
 
Web browsers
Web browsersWeb browsers
Web browsers
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Web browsers
Web browsersWeb browsers
Web browsers
 
Application Software in Computer and Services.pptx
Application Software in Computer and Services.pptxApplication Software in Computer and Services.pptx
Application Software in Computer and Services.pptx
 
browsers MEZH
browsers MEZHbrowsers MEZH
browsers MEZH
 
What is Application Software?
What is Application Software?What is Application Software?
What is Application Software?
 
Web design premium
Web design premiumWeb design premium
Web design premium
 
How to get genuine windows 7 with low cost
How to get genuine windows 7 with low cost How to get genuine windows 7 with low cost
How to get genuine windows 7 with low cost
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
TLE-ICT COMPUTER SYSTEMS SERVICING DIAGNOSING COMPUTER SYSTEM
TLE-ICT COMPUTER SYSTEMS SERVICING DIAGNOSING COMPUTER SYSTEMTLE-ICT COMPUTER SYSTEMS SERVICING DIAGNOSING COMPUTER SYSTEM
TLE-ICT COMPUTER SYSTEMS SERVICING DIAGNOSING COMPUTER SYSTEM
 
Trabajo de jose
Trabajo de jose Trabajo de jose
Trabajo de jose
 

Mehr von Laura Gálvez (14)

Redess!!!!!!!!!!! (1)
Redess!!!!!!!!!!! (1)Redess!!!!!!!!!!! (1)
Redess!!!!!!!!!!! (1)
 
1
11
1
 
Punto 6
Punto 6Punto 6
Punto 6
 
Punto 5
Punto 5Punto 5
Punto 5
 
Punto 4
Punto 4Punto 4
Punto 4
 
Quimca
QuimcaQuimca
Quimca
 
Fisica primera parte
Fisica primera parteFisica primera parte
Fisica primera parte
 
Diap mecanica-fisica2 (1)
Diap  mecanica-fisica2 (1)Diap  mecanica-fisica2 (1)
Diap mecanica-fisica2 (1)
 
Punto 4 herramientas ofimaticas
Punto 4 herramientas ofimaticasPunto 4 herramientas ofimaticas
Punto 4 herramientas ofimaticas
 
Quimíca
QuimícaQuimíca
Quimíca
 
Informatica impresoras
Informatica impresorasInformatica impresoras
Informatica impresoras
 
Educacion fisica
Educacion fisicaEducacion fisica
Educacion fisica
 
Educacion fisica
Educacion fisicaEducacion fisica
Educacion fisica
 
Etica para amador
Etica para amadorEtica para amador
Etica para amador
 

Kürzlich hochgeladen

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Punto 16

  • 1. No Name Sixteenth point. Punto 16. No Name 19/10/2010
  • 2. 16) Make a report in English, about information found on the Internet. AVG Antivirus Free Versión 2011: Among the improvements that we can point out is faster and less resource consuming the CPU. The 2011 version is three times faster than previous versions. Something new that brings new Social Networking AVG Protection is dedicated to real- time scanning shared links in social networks Facebook, MySpace, etc. Verification is done in real time to prevent the proliferation of harmful and dangerous scripts links. AVG Link Scanner, another component protection, make the pages found through a search of safe or not. Compatible with Google, Yahoo, Bing and others, with this tool know before you click on the link, if the page is reliable and should be avoided. Instant Messengers like MSN, ICQ and Yahoo Instant Messenger are also protected with Shield Online, a component that automatically checks files downloaded and shared.