Preview

negative aspects

Satisfactory Essays
Open Document
Open Document
254 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
negative aspects
Negative Aspects of ICT
Questions:
1. Computer viruses and can cause huge problems if they are able to access computer files.

Explain what a computer virus is and what it does

2. Research two different examples of computer viruses and explain how they work and what they do.

3. The risk of picking up a computer virus onto your computer can be reduced by installing a special piece of software.

a. Give the name of the software that can be used to check for viruses and also remove them.

b. Explain why it is important to update anti-virus software regularly.

c. Describe two actions that can be taken, other than using software, to prevent viruses from entering your computer system.

4. Software costs developers a great deal of time and effort to create. Laws exist to try and prevent this software from being illegally downloaded or copied.

a. What is the term given to the act of downloading software illegally from the Internet or copying software without permission?

b. State two rules that copyright laws cover.

5. Software companies use various techniques to try and deter copyright theft. Describe two of these techniques.

6. If your computer is connected to the Internet then it is at risk from hacking.

a. Describe what is meant by the term ‘hacking’

b. Give two reasons why people try to hack into computer systems.

c. Describe two methods that can be used to help stop hacking.

d. What do I mean by a ‘robust password’?

e. Give me an example of a robust password.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    15) Which of the following defines the cycle used to address Windows threats and vulnerabilities? B) Discovery-analysis-remediation…

    • 284 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Mat 540 Quiz

    • 3391 Words
    • 14 Pages

    | Antivirus software can detect and eliminate viruses that are trying to enter your system. Answer…

    • 3391 Words
    • 14 Pages
    Good Essays
  • Satisfactory Essays

    Is3110 Week3 Quiz

    • 347 Words
    • 2 Pages

    3. Malware Install antivirus software Theft Lock computer to desk or encrypt hard drive Network attacks Implement firewall…

    • 347 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt280 Week 1 Homework

    • 359 Words
    • 2 Pages

    C. Place employee on probation, review acceptable use policy (AUP) and employee manual, and discuss status during performance reviews.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NT 2580 Project Part 2

    • 2096 Words
    • 9 Pages

    Issue three. Based on the premise that there is a mix of computer running Windows 2000, Windows XP, Windows Vista, Windows 7, and Mac OS X, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code.…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1330 Unit 1

    • 345 Words
    • 2 Pages

    And once malwares, Trojans, viruses gain entry into the computer system then these software programs destabilize the operating system, cause damage to it. It is recommended to install and use effective PWS: Win32/QQpass.GR removal software like VSKsoft antivirus software to get rid of all malware related issues.…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS305

    • 300 Words
    • 2 Pages

    5. Yes, because they can be exploited and an attacker can create a backdoor into the computer.…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    CGS 3300 exam II

    • 439 Words
    • 2 Pages

    Anti-virus first thing you need to do to protect your computer it detects and eliminates the virus…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 2

    • 639 Words
    • 2 Pages

    1. What are the various types of malware? How do worms differ from viruses? Do Trojan…

    • 639 Words
    • 2 Pages
    Good Essays
  • Good Essays

    MIS 320 Midterm

    • 3629 Words
    • 12 Pages

    Antivirus software is designed to check computer systems and drives for the presence of computer viruses and worms and often eliminates the malicious software, whereas antispyware software combats intrusive and harmful spyware programs. Often the software can eliminate the virus from the infected area. To be effective, antivirus software must be continually updated.…

    • 3629 Words
    • 12 Pages
    Good Essays
  • Powerful Essays

    The CNC Machinist: Quiz

    • 7255 Words
    • 53 Pages

    Pirated software is the unauthorized use, duplication, distribution, or sale of copyrighted software. Software piracy costs businesses billions of dollars a year in lost revenue. Question 5…

    • 7255 Words
    • 53 Pages
    Powerful Essays
  • Powerful Essays

    i. When purchasing a Mac you can be sure that it’s secure from any viral threats. The truth is, hardly anyone writes viruses for Macs. The Mac’s…

    • 1312 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Module 4 Blank Study Guide

    • 2907 Words
    • 12 Pages

    1. How does the spreading of a computer virus compare to the spreading of human viruses?…

    • 2907 Words
    • 12 Pages
    Satisfactory Essays
  • Better Essays

    Computer Hacking

    • 2149 Words
    • 9 Pages

    Computer hacking is one of the biggest crimes in all over the world today. Hacking began in the sixties when MIT students gained control of the school’s mainframe and over the central processing unit and deleted programs. They also used hacking in wars to hack into predator’s machine and change things like times (Harmless Hacking, 2006). When hackers learned about flaws in security systems and found that they could hack into big cooperation’s accounts and bank systems and take money hacking kept growing from there (Bavisi, J 2006). Every day all over the world hacking continues to increase…

    • 2149 Words
    • 9 Pages
    Better Essays