4 Networks and the effects of using them (3)
Resources |
Revision Questions |
Information Communication Technology ICT
Login to see all questions
Click on a question to view the answer
1.
Describe three ways an organization might use an intranet to improve employee productivity. Provide a brief explanation of how each method contributes to increased productivity.
Here are three ways an organization might use an intranet to improve employee productivity:
- Centralized Document Repository: An intranet can serve as a central location for all company documents, policies, and procedures. This eliminates the need for employees to search through multiple email folders or physical files, saving time and ensuring everyone has access to the latest information. This leads to faster access to needed information and reduces time wasted searching.
- Internal Communication Platform: An intranet can host news feeds, announcements, and discussion forums. This facilitates quick and efficient communication between departments and employees, ensuring everyone is informed about important updates, projects, and company news. Improved communication reduces misunderstandings and delays.
- Online Forms and Workflow Automation: Intranets can be used to create online forms for tasks like leave requests, expense reports, and project approvals. These forms can be integrated with workflow systems to automate the approval process, reducing paperwork and speeding up task completion. Automation reduces manual effort and processing time.
2.
Describe how up-to-date antivirus software uses a database of virus signatures to identify and remove viruses from a computer system. Include details of the scanning process and the actions taken when a threat is detected.
Up-to-date antivirus software relies on a constantly updated database of virus signatures. A virus signature is a unique piece of code that identifies a specific virus. The scanning process involves the software examining files on the computer (e.g., during startup, when a file is opened, or on a scheduled basis) and comparing their contents against the virus signature database.
There are typically two main types of scanning:
- File Scanning: This examines individual files for known virus signatures.
- System Scanning: This performs a more thorough scan of the entire system, including boot sectors, directories, and memory.
When a threat is detected, the antivirus software takes action. This may include:
- Quarantine: The infected file is moved to a secure location (the quarantine area) to prevent it from causing harm.
- Removal: The virus is deleted or repaired, if possible.
- Repair: Attempts are made to remove the malicious code from the infected file, restoring it to a clean state.
- Blocking: Access to the infected file or the source of the infection is blocked.
Regular updates to the virus signature database are crucial for effective protection against new and emerging threats. These updates are typically downloaded automatically from the antivirus software vendor.
3.
Describe three different types of antivirus software and explain how each type works to protect a computer. Include examples of popular software for each type.
There are several types of antivirus software, each employing different methods to protect a computer:
- Signature-based Antivirus: This type relies on a database of known virus signatures. It scans files and compares them to the signatures in its database. If a match is found, the file is flagged as malicious. Example: McAfee, Norton.
- Heuristic Analysis Antivirus: Instead of relying solely on signatures, heuristic analysis examines the code of a file for suspicious behavior. It looks for actions commonly associated with malware, even if the file isn't in the signature database. Example: Kaspersky, Bitdefender.
- Real-time Scanning Antivirus: This type constantly monitors the computer's activity, scanning files as they are accessed or downloaded. It provides immediate protection against threats. Example: Avast, ESET NOD32.