Q1:Illustrate out the term malicious code? What are some of the ways that IS managers can protect their computers against this threat? Do you have any experience with malicious code in your place of business or home computer?
Q2: What are the four primary methods by which malicious code can enter a desktop computer? Provide an ex of each method. What type of response to malicious code might you recommend? describe.