a) Contact with contaminated systems:
If a diskette is used on a virus infected computer, it could become contaminated. If the same diskette is used on another computer, then the virus will spread.
b) Use of pirated software:
Pirated software may be contaminated by a virus code or it may have been amended to perform some destructive functions which may affect your computer.
c) Infected proprietary software:
A virus could be introduced when the software is being developed in laboratories, and then copied onto diskettes containing the finished software product.
d) Fake games:
Some virus programs behave like games software. Since many people like playing games on computers, the virus can spread very fast.
e) Freeware and Shareware:
Both freeware & shareware programs are commonly available in Bulletin board systems.
Such programs should first be used in controlled environment until it is clear that the program does not contain either a virus or a destructive code.
f) Updates of software distributed via networks:
Viruses programs can be spread through software distributed via networks.
maurice.mutuku answered the question on September 30, 2019 at 09:43
- Differentiate between private data and confidential data(Solved)
Differentiate between private data and confidential data
Date posted: September 30, 2019. Answers (1)
- Explain how you can defend your files from the following risks
(i) Fire in the computer
(ii) Hackers
(iii) Virus attack
(iv) Disgruntled ex-employees(Solved)
Explain how you can defend your files from the following risks
(i) Fire in the computer
(ii) Hackers
(iii) Virus attack
(iv) Disgruntled ex-employees
Date posted: September 30, 2019. Answers (1)
- The various services are to be provided by servers. Briefly describe the services provided by
(i) Print server
(ii) Internet server
(iii) Intranet server
(Solved)
The various services are to be provided by servers. Briefly describe the services provided by
(i) Print server
(ii) Internet server
(iii) Intranet server
Date posted: September 30, 2019. Answers (1)
- (a) Design a flowchart for a simple program that can be used to categorize people according to age. If the person is above or equal...(Solved)
(a) Design a flowchart for a simple program that can be used to categorize people according to age. If the person is above or equal 18 years, output “Adult” otherwise output “Young”
(b) What is the difference between looping and selection.
Date posted: September 30, 2019. Answers (1)
- Differentiate between a router and a gateway.(Solved)
Differentiate between a router and a gateway.
Date posted: September 30, 2019. Answers (1)
- What is system implementation?(Solved)
What is system implementation?
Date posted: September 30, 2019. Answers (1)
- Work out the following
(a) 1110.1012 - 101.012
(b) Convert EFE16 into decimal form(Solved)
Work out the following
(a) 1110.1012 - 101.012
(b) Convert EFE16 into decimal form
Date posted: September 30, 2019. Answers (1)
- Highlight three Acts of Parliament or laws that govern the use of ICT in Kenya(Solved)
Highlight three Acts of Parliament or laws that govern the use of ICT in Kenya
Date posted: September 30, 2019. Answers (1)
- State four problems that may occur during printing and how to solve them.(Solved)
State four problems that may occur during printing and how to solve them.
Date posted: September 30, 2019. Answers (1)
- Explain how you would unfreeze a computer running windows which has stopped responding to commands(Solved)
Explain how you would unfreeze a computer running windows which has stopped responding to commands
Date posted: September 30, 2019. Answers (1)
- (i) Define the term “system registry”(ii) State three causes of system registry failure(Solved)
(i) Define the term “system registry”
(ii) State three causes of system registry failure
Date posted: September 30, 2019. Answers (1)
- Differentiate between compatibility and interoperability in relation to computer software and hardware.(Solved)
Differentiate between compatibility and interoperability in relation to computer software and hardware.
Date posted: September 30, 2019. Answers (1)
- Most distributions of Linux operating system are available to users under General Public Licence (GPL)
(a) Explain the meaning of GPL
(b) State four examples of...(Solved)
Most distributions of Linux operating system are available to users under General Public Licence (GPL)
(a) Explain the meaning of GPL
(b) State four examples of Linux distributions available under GPL
Date posted: September 30, 2019. Answers (1)
- State three advantages of LED over incandescent and fluorescent illuminating devices.(Solved)
State three advantages of LED over incandescent and fluorescent illuminating devices.
Date posted: September 30, 2019. Answers (1)
- Differentiate between Core 2 Duo and Quad Core processors in terms of internal architecture(Solved)
Differentiate between Core 2 Duo and Quad Core processors in terms of internal architecture
Date posted: September 30, 2019. Answers (1)
- Define Macro(Solved)
Define Macro
Date posted: September 30, 2019. Answers (1)
- The traffic lights serve as output devices for a computerized traffic system. Name the appropriate input device for this system.(Solved)
The traffic lights serve as output devices for a computerized traffic system. Name the appropriate input device for this system.
Date posted: September 30, 2019. Answers (1)
- Describe three ways in which computers have positively impacted on education.(Solved)
Describe three ways in which computers have positively impacted on education.
Date posted: September 30, 2019. Answers (1)
- (a) What is the hexadecimal equivalent of 7478(b) Use one’s compliment to solve 610(Solved)
(a) What is the hexadecimal equivalent of 7478
(b) Use one’s compliment to solve 610
Date posted: September 30, 2019. Answers (1)
- Explain the meaning of the following terms as used in computer programming.
i) Syntax
ii) Semantics(Solved)
Explain the meaning of the following terms as used in computer programming.
i) Syntax
ii) Semantics
Date posted: September 30, 2019. Answers (1)