0% found this document useful (0 votes)
13 views

ICT Group 1A

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

ICT Group 1A

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

MOUNTAINS OF THE MOON UNIVERSITY

FACULTY OF SCIENCE, TECHNOLOGY AND INNOVATION


DEPARTMENT OF COMPUTER SCIENCE

COURSE NAME: INTRODUCTION TO ICT


COURSE CODE: ICTB 1101
LECTURER NAME: MUTABARURA DUNCAN
GROUP 1A
Questions to discuss
Qn6
a) Explain how you can know that your computer is attacked by the virus
b) Explain how you can prevent virus from your computer

MEMBERS
NO NAME REGESTRATION NUMBER
1 ABESIGA HELLEN 2024/U/MMU/BSCED/00800
2 AHAISIBWE RWABWERA IRENE 2024/U/MMU/BSCED/00789
3 KWIKIRIZA JONATHAN BINTA 2024/U/MMU/BSCED/00716
4 AINOMUGISHA BREA 2024/U/MMU/BSCED/00688
5 ALINETHU BIIRA JOAN 2024/U/MMU/BSCED/00790
6 AMANYIRE VICENT 2024/U/MMU/BSCED/01404
7 ATHOLERE RUTH 2024/U/MMU/BSCED/00687
8 ATUGONZA ASIRAF 2024/U/MMU/BSCED/00763
9 ATUGONZA PRECIOUS 2024/U/MMU/BSCED/00779
10 NINSIIMA MERCY 2024/U/MMU/BAED/00833
11 BIRUNGI SHIFAH 2024/U/MMU/BAED/01554
Qn6
(c)
 When the computer starts hanging. Certain programs take long to respond then, error
messages such as close the program appear.
 Duplicate files start being formed from the original ones. This at times consumes a lot of
space and thus drive space becomes occupied.
 Other computer softwares fail to install due to the virus replicating itself in the computer
 Files become corrupted whereby if it was music, it starts playing while pausing due to it being
cracked, images will no longer be displayed.

(d)
 Install and update computer virus softwares such as Avast, Smadav so as to always alert the
user when the virus is detected
 Regular scanning of the computer and other peripheral storage devices that could be plugged
into the computer.
 Setting of passwords and firewalls to prevent unauthorized access from people that bring
their viruses to the computer.
 Avoid use of pirated software that are downloaded from internet as these may be harbors of
computer viruses.

2
Refernces
Understanding computers today and tomorrow by Deborah Morley and Charles S. Parker
ICT for beginners by Steve Williams
Information to Information Technology by James A O’Brein abd George M. Marcus
Computer system and network by R K Ghosh

You might also like