✔ 最佳答案
1. A secured connection involves basic security measures, such as password, certificate (e.g. when you log into eBay, you will see a lock at the right bottom corner. That means SSL verified). With secured connection, others are less likely to get the private information you transfer or receive from a computer/website.
2.You should firmly say "NO". It is because you won't know if the strange is a good man or not. As mentioned in news, there are many sexual crimes commited because young girls meet strangers through the Internet. You should also not to send photos or contact methods to stranges.
3. It is not appropiate. Since each software is protected by the Copyright law, we should respect the hard work by a group of programmers. It is our responsibility to pay for other's work but not just copying them. Moreover, most of the copyright terms are bound to a single computer,e.g. Windows.
4. The disadvantages are short-sightness and lack of communication between family members since most of the teenagers lock themselves in their rooms and surf the net.
5. In computer science, a firewall is a piece of hardware and/or software which functions in a networked environment to prevent some communications forbidden by the security policy, analogous to the function of firewalls in building construction. A firewall is also called a Border Protection Device (BPD), especially in NATO contexts, or packet filter in BSD contexts. A firewall has the basic task of controlling traffic between different zones of trust. Typical zones of trust include the Internet (a zone with no trust) and an internal network (a zone with high trust). The ultimate goal is to provide controlled connectivity between zones of differing trust levels through the enforcement of a security policy and connectivity model based on the least privilege principle.