Get premium membership and access questions with answers, video lessons as well as revision papers.
1,Trojan; secretly places illegal, destructive instructions in the middle of a computer program. Once the program is run, the Trojan becomes active. Trojans can delete, block, modify or copy data. They can also disrupt the performance of a computer or a network. Trojans typically enter a computer system attached to a free game or other utility. Unlike viruses, Trojans do not replicate themselves.
2,Rootkit; is another type of malware that is activated each time a computer system boots (loads) up. Rootkits are difficult to detect because they are activated before the operating system (e.g. MS Windows) has completely booted up. A rootkit often allows the installation of hidden files, hidden processes and hidden user accounts in the operating system of a computer.
3,Back door; is a secret way to access a computer without passing security mechanisms. Back doors are built into a software by the original programmer, who can gain access to the computer by entering a code locally or remotely. Typically programmers install a back door so that they can access a program for troubleshooting purposes. However, hackers often use back doors that they detect or install themselves to enter a computer system.
Other types of infectious malware include:
4,Virus; attaches itself to a program or file and spreads from one computer to another, leaving infections as it travels. Almost all viruses are attached to an executable (.exe) file, which means that a virus may exist on a computer but it actually cannot infect a computer unless the user runs or opens the malicious program. A virus cannot be spread without human action. Viruses are usually spread by sharing infected files as email attachments or downloaded from websites.
5,Worm; is a type of malware that self-replicates and distributes copies of itself in a computer network. Worms spread from computer to computer, but unlike viruses, worms are able to infect computer systems without intervention from computer users. For example, a worm can send copies of itself to all contacts in an email address book. The worm replicates again and sends itself out to everyone listed in each of the receiver's address. Typically worms slow down computer systems and networks.
6,Adware; is a software application that automatically displays advertising banners while the program is running. The programmers of these software applications include additional code that displays advertisements in pop-up windows or in a bar on the computer screen. These advertisements sponsor the development and free use of the software applications (freeware). The advertisements disappear when users stop running the freeware software. Some freeware applications may contain adware which tracks the Internet surfing habits of users and pass this on to third parties, without the user's authorization or knowledge. The users will then receive other advertisements that are targeted to their Internet browsing habits etc. When the adware becomes intrusive like this it is considered as spyware.
7,Spyware; is a program that secretly installs itself on computers and collects information about users without their knowledge. Spyware programs can collect various types of personal information, such as Internet surfing habits and sites that have been visited. They can also interfere with user control of the computer in other ways, such as installing additional software and redirecting web browser activity. Spyware changes the computer settings, resulting in slow connection speeds, different home pages, and/or loss of Internet or functionality of other programs.
8,Botnet; is a group of computers connected together for malicious purposes. Each computer in a botnet is called a bot. These bots form a network of compromised computers used to transmit malware or spam, or to launch attacks. Botnet attacks slow down a computer network or a website.
9,Keystroke logging; is a program that allows the user to monitor what another user types into a device. It involves recording consecutive key strokes on a keyboard. Sensitive information such as usernames and passwords that are keyed in the computer may be stolen through such programs.
10, Dialer ; is a program that causes the computer to dial premium (high rate) telephone numbers without the user’s knowledge or consent. This will result in high telephone bills. This is possible only if users are using a dial-up modem
Dominic M answered the question on May 16, 2018 at 09:29
- What is a malware in computer protection?(Solved)
What is a malware in computer protection?
Date posted: May 16, 2018. Answers (1)
- Explain how to set password for Microsoft Excel Workbook?(Solved)
based on Microsoft Excel Workbook
Date posted: May 16, 2018. Answers (1)
- Explain how to set a password for a Microsoft word document?(Solved)
Explain how to set a password for a Microsoft word document?
Date posted: May 16, 2018. Answers (1)
- Explain how to recover and empty files from the computer recycle bin?(Solved)
Explain how to recover and empty files from the computer recycle bin?
Date posted: May 15, 2018. Answers (1)
- Giving examples explain dual booting in computers?(Solved)
Giving examples explain dual booting in computers?
Date posted: May 15, 2018. Answers (1)
- Explain how to clean temporary files and history with free software for windows?(Solved)
Explain how to clean temporary files and history with free software for windows?
Date posted: May 15, 2018. Answers (1)
- Define the following terms as they are used in Desktop publishing and graphic design.
a. WYSIWYG
b. RGB
c. LOGO
d. BLEED
e. ZOOM
f.RMM...(Solved)
Define the following terms as they are used in Desktop publishing and graphic design.
a. WYSIWYG
b. RGB
c. LOGO
d. BLEED
e. ZOOM
f.RMM (with reference to memory).
g.EBCDIC
Date posted: May 11, 2018. Answers (1)
- Name at least five Objects you can insert in a word document using Insert TAB.(Solved)
Name at least five Objects you can insert in a word document using Insert TAB.
Date posted: May 11, 2018. Answers (1)
- Contrast and proximity are exemplified as the principles of design most useful to a desktop publisher. How are they applied? (Solved)
Contrast and proximity are exemplified as the principles of design most useful to a desktop publisher. How are they applied?
Date posted: May 11, 2018. Answers (1)
- Printers can receive 3 different types of data. Briefly Explain.(Solved)
Printers can receive 3 different types of data. Briefly Explain.
Date posted: May 11, 2018. Answers (1)
- Word Processing, Graphic Design and Desktop Publishing are related. Discuss these terms as used in computer aided design clearly showing their differences. (Solved)
Word Processing, Graphic Design and Desktop Publishing are related. Discuss these terms as used in computer aided design clearly showing their differences.
Date posted: May 11, 2018. Answers (1)
- Mr Isaac Muthini is a system Analyst at Code Labs Services, outline four responsibilities that should carry out in the Firm(Solved)
Mr Isaac Muthini is a system Analyst at Code Labs Services, outline four responsibilities that should carry out in the firm.
Date posted: May 10, 2018. Answers (1)
- Explain the difference between the dynamic RAM and static RAM(Solved)
Explain the difference between the dynamic RAM and static RAM.
Date posted: May 10, 2018. Answers (1)
- Expand and Express 622 base 10 in BCD form(Solved)
Expand and Express 622 base 10 in BCD form.
Date posted: May 10, 2018. Answers (1)
- Web Design is not simply collecting data and uploading but rather a process”. Using relevant illustrations, justify the validity of this statement. (Solved)
Web Design is not simply collecting data and uploading but rather a process”. Using relevant illustrations, justify the validity of this statement.
Date posted: May 9, 2018. Answers (1)
- How can creation of a website favors publishing of data and information? (Solved)
How can creation of a website favors publishing of data and information?
Date posted: May 9, 2018. Answers (1)
- Briefly describe web authoring software process(Solved)
Briefly describe web authoring software process
Date posted: May 9, 2018. Answers (1)
- Distinguish between web hosting and web publishing (Solved)
Distinguish between web hosting and web publishing
Date posted: May 9, 2018. Answers (1)
- There is a trend where most of the modern business organizations are slowly turning towards use of websites to market themselves and their activities,...(Solved)
There is a trend where most of the modern business organizations are slowly turning towards use of websites to market themselves and their activities, higher educational institutions like universities taking the forefront. Explain this trend using appropriate examples for the case of Bondo University College.
Date posted: May 9, 2018. Answers (1)
- Identify and describe using relevant illustrations the main features of a web publication form(Solved)
Identify and describe using relevant illustrations the main features of a web publication form.
Date posted: May 9, 2018. Answers (1)