QUESTION6: STRUCTUREDQUESTIONS
[12]
6.1 Name 5 functions of an operating system.
[5]
6.2 Explain the difference between Single task operating system and
Multi-task operating system.
[2]
6.3 Choose the alphabetic letter from column TWO that corresponds with the description in
column ONE in connection with malware.
[S]
COLUMN ONE
1 A type of malware that spreads from
computer to computer, and travels
without human action.
2 A program that secretly collects
information about the computer user
and conveys confidential user
information to external users.
3 A type of malware often disguised as
legitimate software.
4 A program that displays on-line
advertisements on a computer, also
called op-up windows or banners
5 A malicious program that hides in a
computer that allows someone to
access the program remotely ant take
full control of the host computer.
COLUMN TWO
A TJOJANHORSE
B WORM
C ADWARE
D ROOTKIT
E SPYWARE
QUESTION7: STRUCTUREDQUESTIONS
[12]
7.1 Suggest 5 ways to your friend on how he can protect his password.
[4]
7.2 Stealing of Software is an example of software theft. Name TWO other types of software
theft.
[2]
7.3 Explain the following terms:
7.3.1 Intellectual Property Rights
[2]
7.3.2 Copyright
[2]
7.3.3 Green Computing
[2]
TOTAL: [100 MARKS]
8