0% found this document useful (0 votes)
4 views2 pages

Computer Virus

The document is a guide for Grade 6A ICT students on computer viruses, detailing their nature, how they spread, notable examples, and prevention methods. It explains that viruses can enter systems via email attachments, infected websites, and removable storage devices. Additionally, it outlines five preventative measures including software updates, strong passwords, cautious downloading, antivirus usage, and data backups.

Uploaded by

mcleroymoyo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views2 pages

Computer Virus

The document is a guide for Grade 6A ICT students on computer viruses, detailing their nature, how they spread, notable examples, and prevention methods. It explains that viruses can enter systems via email attachments, infected websites, and removable storage devices. Additionally, it outlines five preventative measures including software updates, strong passwords, cautious downloading, antivirus usage, and data backups.

Uploaded by

mcleroymoyo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

ICT CALA GUIDE

Candidate Number:
Candidate Name:
Level: Grade 6A
Subject: ICT
Topic: Computer Viruses
Duration: Two weeks
CALA Type: Pen paper

Competences

1. Computer Virus:
A computer virus is a malicious software program that replicates itself and infects a computer
system by inserting its own code into other software programs. It can cause harmful effects
such as data loss, system crashes, and unauthorized access.

2. Three ways viruses get into computers:


a) Email attachments: Viruses can be attached to email messages as executable files or
disguised as innocent-looking files. When users open these attachments, the virus can infect
the computer.
b) Infected websites: Visiting compromised websites or downloading files from untrusted
Removable storage devices sources can expose your computer to malware, including viruses.
c): Viruses can spread by attaching themselves to external storage devices like USB drives.
When an infected device is connected to a computer, the virus can spread to that computer.

3. Five computer viruses and their characteristics:


a) ILOVEYOU: This virus spread through email as a love confession attachment. It
overwrote image and media files, causing extensive damage.
b) Melissa: Melissa was a virus that spread through infected Microsoft Word documents sent
as email attachments. It slowed down email servers by rapidly replicating itself.
c) Sasser: Sasser exploited a vulnerability in Windows operating systems. It caused system
crashes and allowed unauthorized remote access to infected computers.
d) Crysis: Crysis encrypted files on infected computers and demanded a ransom for their
release, making it a ransomware virus.
e) Conficker: This worm spread by exploiting vulnerabilities in Windows systems. It created
a botnet and could allow remote control of the infected computers.

4. Five ways of preventing computer viruses:


a) Keep your software up to date: Regularly update your operating system, antivirus software,
and other software programs to patch security vulnerabilities.
b) Use strong and unique passwords: Passwords should be a combination of letters, numbers,
and symbols. Avoid using easily guessable information and use different passwords for
different accounts.
c) Be cautious with email attachments and downloads: Only open email attachments from
trusted sources and download files from reputable websites.
d) Use antivirus and antimalware software: Install a reliable antivirus program and keep it up
to date. Regularly scan your system for any potential viruses.
e) Backup your data: Regularly back up your important files and data to an external storage
device or cloud-based service. In case of an infection, you can restore your system to a safe
state.

You might also like