Professional Documents
Culture Documents
Tutorial Computer Security It
Tutorial Computer Security It
Tutorial Computer Security It
CIT10103/CCT0064/HIT10204/FCS0063
INTRODUCTION TO INFORMATION
TECHNOLOGY/INFORMATION TECHNOLOGY
Student’s: MSUCTRG
Matrix No:2092021070007
Date submitted: 18 /11/2021
Name: NURAIN ATIFAH BINTI MOHD ROKI
Question 1:
Define antivirus program. Then, explain the antivirus program that you used in
your computer/laptop. Explain the advantages when you are using your
- Among the antivirus that is always used in my computer is the aviva apps, which are apps
that help protect any important information from being infected with harmful viruses. these
apps also help me a lot from getting any problems that can cause my computer to crash. the
use of this aviva app also helps to remove unimportant data and is able to further ease the
use of data in ram. the use of apps like these allows one to work easily and not have to
worry about a computer infected with a virus. I hope more users use these apps to prevent
dangerous viruses from entering the computer with this step we can prevent it.
Question 2:
- There are tens of thousands of types of viruses that can be found in computers. viruses are
very dangerous to computers because viruses can destroy all the information that is in the
computer. among the viruses that can always be found are A worm is similar to a virus by its
design, and is considered to be a sub-class of a virus. A Trojan horse is not a virus. It is a
destructive program that looks as a genuine application. Unlike viruses, Trojan horses do not
replicate themselves but they can be just as destructive. A Trojan horse is a type of malware
that downloads onto a computer disguised as a legitimate program. A Trojan horse is so-
called due to its delivery method, which typically sees an attacker use social engineering to
hide malicious code within legitimate software.
Question 3:
Based on your opinion, what characteristics that you should use when you want
- Among the features that I will put is the date or about yourself to make it easier to
remember the password that is placed. it makes my business easier. In addition, I will put a
combination of names or dates of birth so that it is easy for family or good friends to track
the password and only certain people know the password I put if anything happens to me.
Question 4:
When we buy any product or software online, we tend to see the license
what did you do when you see those license agreement? Did you read it? What
consequences that you can expect when you simply accept the license
agreement?
- yes, i will read it before doing anything to make sure it is right or wrong. with this step I can
make sure the goods I ordered arrive perfectly and no problems occur. this agreement must
be done so that if the owner violates the agreement can be prosecuted for violating the
stipulated agreement.