Tutorial Computer Security It

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

TUTORIAL COMPUTER SECURITY

CIT10103/CCT0064/HIT10204/FCS0063
INTRODUCTION TO INFORMATION
TECHNOLOGY/INFORMATION TECHNOLOGY

FOR SERVICE INDUSTRY

Lecturer: Miss Siti Zunnurain Bt Zainuddin

Student’s: MSUCTRG
Matrix No:2092021070007
Date submitted: 18 /11/2021
Name: NURAIN ATIFAH BINTI MOHD ROKI
Question 1:

Define antivirus program. Then, explain the antivirus program that you used in

your computer/laptop. Explain the advantages when you are using your

antivirus program and your opinion to those antivirus program.

- Among the antivirus that is always used in my computer is the aviva apps, which are apps
that help protect any important information from being infected with harmful viruses. these
apps also help me a lot from getting any problems that can cause my computer to crash. the
use of this aviva app also helps to remove unimportant data and is able to further ease the
use of data in ram. the use of apps like these allows one to work easily and not have to
worry about a computer infected with a virus. I hope more users use these apps to prevent
dangerous viruses from entering the computer with this step we can prevent it.

Question 2:

Explain viruses, worms and trojan horses.

- There are tens of thousands of types of viruses that can be found in computers. viruses are
very dangerous to computers because viruses can destroy all the information that is in the
computer. among the viruses that can always be found are A worm is similar to a virus by its
design, and is considered to be a sub-class of a virus. A Trojan horse is not a virus. It is a
destructive program that looks as a genuine application. Unlike viruses, Trojan horses do not
replicate themselves but they can be just as destructive. A Trojan horse is a type of malware
that downloads onto a computer disguised as a legitimate program. A Trojan horse is so-
called due to its delivery method, which typically sees an attacker use social engineering to
hide malicious code within legitimate software.

Question 3:

Based on your opinion, what characteristics that you should use when you want

to set username and password?

- Among the features that I will put is the date or about yourself to make it easier to
remember the password that is placed. it makes my business easier. In addition, I will put a
combination of names or dates of birth so that it is easy for family or good friends to track
the password and only certain people know the password I put if anything happens to me.
Question 4:

When we buy any product or software online, we tend to see the license

agreement for buying the product/software. Based on your own perspectives,

what did you do when you see those license agreement? Did you read it? What

consequences that you can expect when you simply accept the license

agreement?

- yes, i will read it before doing anything to make sure it is right or wrong. with this step I can
make sure the goods I ordered arrive perfectly and no problems occur. this agreement must
be done so that if the owner violates the agreement can be prosecuted for violating the
stipulated agreement.

You might also like