Get premium membership and access questions with answers, video lessons as well as revision papers.
(i) Malfunction of computer system's hardware parts especially the storage media is a threat to the computer system because data/ information and programs stored on them is at risk too.
(ii) Logical errors that enable the computer software to run but gives the wrong as a result of software bugs is regarded to be a threat because the wrong output generated may lead to wrong decisions being made.
Control measures.
(i) Always run both software and hardware diagnostic utilities.
(ii) Always create backups especially for sensitive data/ information.
(iii) The hardware damaging environmental conditions dust, dampness, magnetic fields or heat should always be contained.
(iv) Thoroughly test the software for any algorithmic errors during development and implementation of the software to avoid logical errors.
maurice.mutuku answered the question on April 14, 2018 at 15:03
- How can unauthorized access lead to a threat to computer systems and what control measure can be put in place to curb this vice?(Solved)
Discuss how unauthorized access can lead to a threat to computer systems and what control measure can be put in place to curb this vice.
Date posted: April 14, 2018. Answers (1)
- How can you prevent viruses from attacking your computer?(Solved)
Give ways of preventing viruses from attacking your computer.
Date posted: April 14, 2018. Answers (1)
- In what ways do viruses spread from one computer to another?(Solved)
Give ways in which viruses spread from one computer to another.
Date posted: April 14, 2018. Answers (1)
- What are the symptoms of a computer infected by viruses?(Solved)
List the symptoms of a computer infected by viruses.
Date posted: April 14, 2018. Answers (1)
- What are the types of computer viruses?(Solved)
Highlight the types of computer viruses.
Date posted: April 14, 2018. Answers (1)
- What are the common properties of computer viruses?(Solved)
Discuss the common properties of computer viruses.
Date posted: April 14, 2018. Answers (1)
- What is a computer virus?(Solved)
Define computer virus.
Date posted: April 14, 2018. Answers (1)
- What are the main security threats to data?(Solved)
Highlight the main security threats to data.
Date posted: April 14, 2018. Answers (1)
- What is confidential data?(Solved)
Define confidential data.
Date posted: April 14, 2018. Answers (1)
- What is private data?(Solved)
Define private data.
Date posted: April 14, 2018. Answers (1)
- What is data security?(Solved)
Define data security.
Date posted: April 14, 2018. Answers (1)
- What is data privacy?(Solved)
Define data privacy.
Date posted: April 14, 2018. Answers (1)
- Which procedure would you use in accessing a research topic notes from the Internet?(Solved)
Describe the procedure you would use in accessing a research topic notes from the Internet.
Date posted: April 14, 2018. Answers (1)
- What are the qualities of good e-mail contact management software?(Solved)
Give the qualities of good e-mail contact management software.
Date posted: April 14, 2018. Answers (1)
- Explain some commonly used workbook management practices when working on MS Excel.(Solved)
Explain some commonly used workbook management practices when working on MS Excel.
Date posted: April 14, 2018. Answers (1)
- State the basic keyboard shortcut keys used to format and edit a spreadsheet.(Solved)
State the basic keyboard shortcut keys used to format and edit a spreadsheet.
Date posted: April 14, 2018. Answers (1)
- State the keyboard shortcuts used in navigating through a spreadsheet.(Solved)
State the keyboard shortcuts used in navigating through a spreadsheet.
Date posted: April 14, 2018. Answers (1)
- Explain the most fundamental keyboard shortcuts when dealing with spreadsheets.(Solved)
Explain the most fundamental keyboard shortcuts when working with spreadsheets.
Date posted: April 14, 2018. Answers (1)
- What is the use of WAP and WML with regard to telephone messaging in handsets?(Solved)
Discuss the use of WAP and WML with regard to telephone messaging in handsets.
Date posted: April 14, 2018. Answers (1)
- Three methods of detecting system errors(Solved)
Three methods of detecting system errors.
Date posted: April 14, 2018. Answers (1)