Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 10

Basic ICT Skills

ICT skills are abilities that help you understand and operate a
wide range of technology software.This can include helping users
with tasks on computers,such as making video calls,searching on
the internet or using a mobile device like a tablet or phone.
What is Operating System?

An operating system (OS) is the program that, after being initially loaded
into the computer by a boot program,manages all of the other
application programs in a computer.The application program make use
of the operating system by making requests for services through a
defined application program interface (API).
Types of Computer Viruses

Every virus has a payload that performs an action.The threat actor can
code any malicious activity into the virus payload,including
simple,innocuous pranks that don’t do any harm. While a few viruses
have harmless payloads,most of them cause damage to the system and
its data. There are nine main virus types,some of which could be
packaged with other malware to increase the chance of infection and
damage.The nine major categories for viruses are:
Macro viruse
Microsoft Office files can run
macros,and these macros can be
used to download additional
malware or run malicious code.
Macro viruses deliver a payload Web scripting viruses
when the file is opened, and the Most browsers have defenses
macro runs. against malicious web scripts,
but older, unsupported browsers
have vulnerabilities that allow
an attacker to run code on the
local device
Disk Deframentar

Defragmentation is the process of consolidating fragmented files on the


user’s hard drive. Files become fragmented when data is written to
disk,and there is not enough contiguous space to hold the complete
file.Storage algorithms break the data apart so that it will fit into the
available space.
The process of defragmentation moves the data blocks on the hard drive
around to bring all the parts of a file together. Defragmentation reduces
file system fragmentation,increasing the efficiency of data retrieval and
thereby improving the overall performance of the computer. At the same
time, it cleans the storage and provides additional storage capacity.
Threats to the Computer

Types of Threats
Following are the most common types of computer threats:
1. Physical damage- It includes fire, water,pollution etc.
2. Natural Events-It includes climatic, earthquake,volcanic activity etc.
3. Loss of services- It includes electrical po,air conditioning,
telecommunication,etc.
4. Technical failures-It includes problems in equipment, software, capacity,
saturation etc.
5. Deliliberattype-It includes spying,illegalprocessing of data etc.
Hardware Security

Hardware security is vulnerability protection that comes in the form of a


physical device rather than software that’s installed on the hardware of
a computer system.
Hardware security can pertain to a device used to scan a system or
monitor network traffic.Common examples include hardware firewalls
and proxy servers.Less common examples include hardware security
modules that provision cryptographic keys for critical functions such as
encryption, decryption and authentication for various systems.Hardware
systems can provide stronger security than software and can also include
an additional layer of security for mission-critical systems.
Anti-virus Software

Anti-virus software, also known as anti-malware, is a computer program


used to prevent, detect, and remove malware. Anti-virus software was
originally developed to detect and remove computer viruses.
How to use an Anti-virus software

These instructions apply to any device or anti-virus software:


First, complete all security updates.
Do a Full Scan.
Read the results.
Follow the prompts.
Schedule Future Automatic scans.
Quick Scan

 Click on Start
 Hit the settings button
 Choose Update & Security
 Click on Windows Security
 Click on Virus & Threat Protection
 Under Current threats, select Quick scan/Threat History
 Click on Scan Now.

You might also like