Kami Export - Task-1-Negative - Aspects - Ict

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Negative Aspects of ICT

Questions:
1. Computer viruses and can cause huge problems if they are able to access computer files.

Explain what a computer virus is and what it does

computer virus is a piece of code which is capable of copying itself and typically has a detrimental
effect, such as corrupting the system or destroying data.

2. Research two different examples of computer viruses and explain how they work and
what they do.

Virus Example 1: File-infecting Virus

What it can do:


A virus that attached itself to an executable program.

Virus Example 2: Macro Virus

What it can do: • This type of virus is commonly found in programs such as Microsoft Word or
Excel. ...

3. The risk of picking up a computer virus onto your computer can be reduced by installing
a special piece of software.

a. Give the name of the software that can be used to check for viruses and also remove
them.

Anti-Virus

b. Explain why it is important to update anti-virus software regularly.

It is important to constantly update the antivirus software on a computer because


computers are regularly threatened by new viruses

IGCSE ICT – Unit 6: Effects of ICT Mark Nicholls – ICT Lounge


c. Describe two actions that can be taken, other than using software, to prevent viruses
from entering your computer system.

using a strong virus

using VPN

4. Software costs developers a great deal of time and effort to create. Laws exist to try and
prevent this software from being illegally downloaded or copied.

a. What is the term given to the act of downloading software illegally from the Internet
or copying software without permission?

copyright

b. State two rules that copyright laws cover.

Renting out software without permission is illegal

Software should not be copied, sold or given away to other people

5. Software companies use various techniques to try and deter copyright theft. Describe
two of these techniques.

serial numbers

holograms

6. If your computer is connected to the Internet then it is at risk from hacking.

a. Describe what is meant by the term ‘hacking’


the gaining of unauthorized access to data in a system or computer.

IGCSE ICT – Unit 6: Effects of ICT Mark Nicholls – ICT Lounge


b. Give two reasons why people try to hack into computer systems.

To get to your personal information so they can commit crime under your name

some want to sell your personal information to make money

c. Describe two methods that can be used to help stop hacking.

firewall

Vpn

d. What do I mean by a ‘robust password’?

a srong password

e. Give me an example of a robust password.

auntymama'sfoodpotkano0023

IGCSE ICT – Unit 6: Effects of ICT Mark Nicholls – ICT Lounge

You might also like