1.1 Computer Applications
1.1 Computer Applications
SECTION 2: SAQs
21. Definition
a. Computer - a programmable device that stores, retrieves, and processes data.
b. Information - is data computed into a more useful form than raw form.
c. Program - is a series of instructions written in the language of the computer for
them to obey and perform specific tasks as outlined by the instructions.
d. Processing - the computer will manipulate the data held within it to a more useful
form — results (information
e. Processing cycle - if the same resources are used in the same way, the same
outcome will result.
22. Components of computer that help in making the processing of data easier and
convenient.
a. Input device/unit – keyboard, mouse, barcode reader, scanner, joystick
b. Output device/unit – printer, VDU
c. Combination of input/output device – NIC
d. Storage device/unit – RAM, floppy disc, hard disc, CD ROM, DVD
e. Combination of input output unit – video camera
f. Processing device/unit – CPU
Page 1 of 5
KMTC/QP-08/EMS
24. Outline five (5) services that the operating/programming software can do.
a. saving data memory in files on the disc
b. loading files from disk onto memory
c. sending document on to the printer
d. copy/move data from one document to another or one programmes to another
e. prepare the disc to store data
Page 2 of 5
KMTC/QP-08/EMS
f. Stealth viruses
Page 3 of 5
KMTC/QP-08/EMS
1. Signature based detection is the most common method of virus detection by anti-virus is
tracing the virus signature definitions (fingerprints) or its variants since they have the same
signatures. To identify viruses and other malware, antivirus software compares the contents of a
file to a dictionary of virus signatures.
Page 4 of 5
KMTC/QP-08/EMS
2. Heuristic-based detection, like malicious activity detection, can be used to identify unknown
viruses. Some more sophisticated antivirus software uses heuristic analysis to identify new
malware or variants of known malware.
3. File emulation is another heuristic approach. File emulation involves executing a program in
a virtual environment and logging what actions the program performs. Depending on the actions
logged, the antivirus software can determine if the program is malicious or not and then carry out
the appropriate disinfection actions.
4. Rootkit detection. Anti-virus software can also scan for rootkits; a rootkit is a type of
malware that is designed to gain administrative-level control over a computer system without
being detected. Rootkits can change how the operating system functions and in some cases can
tamper with the anti-virus program and render it ineffective. Rootkits are also difficult to
remove, in some cases requiring a complete re-installation of the operating system. Because
viruses can embed themselves in existing files, the entire file is searched, not just as a whole, but
also in pieces.
Page 5 of 5