0% found this document useful (0 votes)
73 views

Moshood Abiola Polytechnic: P.M.B, 2210, Ojere, Abeokuta, Ogun State School of Business Management Studies (SBMS)

The document contains a class roster for a course called ICT 1 taught at Moshood Abiola Polytechnic's School of Business Management Studies, Department of Accountancy. It lists 5 students enrolled in the course along with their matriculation numbers. It also contains 3 questions about common threats to computer systems and malware, asking students to define viruses, worms, and Trojan horses.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
73 views

Moshood Abiola Polytechnic: P.M.B, 2210, Ojere, Abeokuta, Ogun State School of Business Management Studies (SBMS)

The document contains a class roster for a course called ICT 1 taught at Moshood Abiola Polytechnic's School of Business Management Studies, Department of Accountancy. It lists 5 students enrolled in the course along with their matriculation numbers. It also contains 3 questions about common threats to computer systems and malware, asking students to define viruses, worms, and Trojan horses.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

MOSHOOD ABIOLA POLYTECHNIC

P.M.B, 2210, OJERE, ABEOKUTA, OGUN STATE


SCHOOL OF BUSINESS MANAGEMENT STUDIES (SBMS)

DEPARTMENT:- ACCOUNTANCY

COURSE CODE:- OTM 112

COURSE TITLE:- ICT 1

LECTURE IN CHARGE:- SEGUN KILANI

S/ NAMES MATRIC NO
N
1 FALODE. ELISHA BLESSING 16/03/0228
2 EZE IFEOMA EGWUATU 16/03/0152
3 AJIBOYE BUSHIRAT DAMILOLA 16/03/0215
4 OGUNLEYE SAIDAT FUNMILAYO 16/03/0216
5 BALOGUN HALIMOT SADIAT 16/03/0331

QUESTION

1. WHY ARE COMPUTER SYSTEM SO VULNERABLE

2. DISCUSS BRIEFLY AT LEAST (8) COMMON THREATS AGAINST


COMTEMPORARY INFORMATION SYSTEMS

bi WHAT DO YOU UNDERSTAND BY MALWARE

ii EXPLAIN BRIEFLY ON EACH OF THE FOLLOWING

a) VIRUS
b) WORM
c) TROJAN HORSE

You might also like