共查询到20条相似文献,搜索用时 62 毫秒
1.
2.
针对目前电脑病毒的传播途径,电脑使用者可谓想尽各种招数来预防,但是电脑病毒无孔不入,稍有疏忽,你的电脑就有中招的可能。一旦中招,有时即便用最新的杀毒软件也无济于事。对于一些难以清除的电脑病毒该如何根除呢,这就是本文要为大家回答的问题。 相似文献
3.
电脑产生后不久,电脑病毒也开始随之曼延,特别是现在网络的广泛使用,让电脑病毒更加猖獗。那么我们怎样了解电脑是否中了病毒?中了什么样的病毒呢? 相似文献
4.
5.
贾培武 《数字社区&智能家居》2009,(10):47-48
上回电脑还用得好好的,这回开机时电脑启动不了了,这有可能是电脑病毒在捣鬼。或者,杀毒软件发现了病毒,却清除不了,甚至以安全模式启动windows也不能够将病毒杀掉。当你遇到这样的电脑病毒问题时,瑞星的LINUX引导杀毒U盘就可以发挥它的用武之地了。 相似文献
6.
7.
电脑属于高科技产品,使用电脑需要一定的专业知识,否则不仅不能充分发挥电脑的应有作用,反而会造成难以预料的损失。文中首先探讨电脑病毒的危害及防范措施;接着阐述合理选择与设置显示器和正确维护显示器的方法;最后列举19种方法用于防范电脑的死机故障。 相似文献
8.
9.
10.
11.
Extensive development in universities’ provision of computer facilities may have negative consequences for students prone to computer avoidance. In the present study, undergraduates (N = 363) completed self-report measures on computer phobia and self-efficacy. Results demonstrate that many students follow previous trends by continuing to report levels of computer phobia within the higher parameters of self-report measures. Students who reported either high computer phobia or low computer self-efficacy were less likely to maximise their use of university computer facilities. Moreover, a range of background measures – initial computer experience, regular home use, successful completion of a computer course and introductory tutor’s characteristics – all impacted statistically on self-report responses. Results are discussed with reference to the increasing responsibility placed on students to acquire ICT skills. 相似文献
12.
Research has found that computer attitudes play a key role in influencing the extent to which students accept the computer as a learning tool and in determining the likelihood that computer will be used in the future for learning and study. A sample of 183 students reported their computer attitudes using a Likert-type questionnaire with three subscales, computer importance, computer enjoyment, and computer anxiety. One-way MANOVA revealed no significant differences in computer attitudes by gender although male students reported more positive towards the computer than female students. There were significant differences between students who own computers at home and those who do not and students who own a computer at home also reported a lower level of computer anxiety compared to those who do not. 相似文献
13.
The importance and use of computers has increased dramatically over the last two decades. The Attitudes Towards Computer Usage Scale (ATCUS) was developed in 1986 [Popovich, P. M., Hyde, K. R., Zakrajsek, T., & Blumer, C. (1987). The development of the attitudes toward computer usage scale. Educational and Psychological Measurement, 47, 261–269.] and used in a variety of settings over the years. In order to examine how computer attitudes have changed from 1986 to 2005, the ATCUS was given to 254 male and female current undergraduate students. When comparing the 1986 with 2005 results, the amount of time spent using a computer was still positively related to computer attitudes; however, the number of college computer courses was not. There is no longer a significant relationship among any of the factors with college computer courses. Males and females no longer significantly differ in their attitudes toward computers, number of college computer courses, amount of time spent using computers, or degree of self-reported computer anxiety. Implications are discussed. 相似文献
14.
15.
计算机技术正以惊人的速度发展着,更新换代之快令人应接不暇。但是,以传统的、数字计算为基础的电子计算机,在其研究与发展的技术理论与技术手段上,存在着诸多限制,严重阻碍着计算机的未来发展。本文从现在电子计算机的发展现状与未来分析着手,从量子计算机、生物计算机两个方面,分析了计算机研究开发领域中的未来发展趋势。 相似文献
16.
Computer use and the gender gap: The issue of access, use, motivation, and performance 总被引:3,自引:2,他引:3
Since the beginning of computerization, it has been of interest whether there are differential effects on computer behavior, in particular in terms of computer access, computer use, and motivational variables, such as computer self-efficacy. The current research addresses the questions if the gender-related differences in this respect persist to the present day and if there is also a difference in actual performance characteristics. A sample of 48 university students (23 male) was administered a technology self-efficacy questionnaire, a survey on computer access, recorded a user diary, and turned in a computer task. Results show that the gender gap is closing as far as computer access and self-efficacy are concerned. Also, female and male students report comparable amounts of computer usage for their studies. User behavior appears to be gender-specific as males spend more time at the computer for personal purposes. There is also some evidence that male students outperform female students at a computer task (remastering of Power-Point slides). Conclusions for creating computer-based learning environments are discussed. 相似文献
17.
This study’s purpose was to provide additional psychometric data on the Computer Aversion, Attitudes, and Familiarity Index (CAAFI). The CAAFI is comprised of 40 items, yielding a total score and four factor scores with 10 items each (one familiarity, one attitudes, two aversion). The measure was administered to a sample of undergraduate psychology students (N = 293) along with the Computer Understanding and Experience Scale, the Computer Attitude Scale, and the Computer Aversion Scale. The factor structure of the CAAFI was supported via confirmatory factor analytic procedures and analysis of internal consistency reliability coefficients. In relation to the other measures of computer-related constructs, the strongest validity support was found for the CAAFI total score and Factors 1 (computer familiarity) and 3 (computer aversion-discomfort), followed by Factor 2 (computer attitudes). With regard to Factor 4 (computer aversion-fear), given the results of the analyses the decision was made to remove these items from the CAAFI in order to enhance the measure’s psychometric properties and practical utility. 相似文献
18.
邓建萍 《计算机光盘软件与应用》2011,(12)
随着计算机和互联网技术的发展,各种计算机犯罪案件也随之增多。计算机犯罪不仅会造成财产损失,还会危及国家和公共安全,远比传统犯罪的危害性大得多,因此计算机取证在司法鉴定中占据越来越重要的位置,计算机取证的主要环节就是数据恢复,本文就数据恢复技术在计算机取证方面的应用作一个初步的探索。 相似文献
19.
Ken Wong 《Computers & Security》1985,4(4):287-295
An analysis will be made on 95 cases of computer fraud and over 60 cases of computer crime reported in the U.K. from various private and public sources to establish the pattern of abuse and the modus operandi in various crime perpetration — who are the victims, who are the computer criminals, size of loss, penalties and detection and lessons learnt from the reported cases.The paper moves on to discuss the various options of risk control and crime prevention, risk analysis and business impact review, and how to set a budget for control of abuse.The paper closes with a discussion of the future implications from the proliferation of personal computers, office systems and distributed processing. What advantages would the future criminal gain from these activities? What would the auditor or security manager have to do to combat the potential new crime wave? 相似文献
20.
通过在计算机上安装虚拟机软件Virtual PC,使用这种虚拟机技术,可以消除学生上机实习操作内容多样性和机房安全管理稳定性之间的矛盾,不需要再对学生上机进行过多的限制,给学生营造一个宽松的学习环境,从而提高了学生计算机操作和应用能力.虚拟机技术值得在各类学校计算机教学实习和机房管理中大力推广使用. 相似文献