100% found this document useful (2 votes)
3K views2 pages

Class 7 Computer Science CHAPTER 3 (Computer Viruses)

This document discusses computer viruses and includes questions and answers about them. It defines a computer virus as a program that can copy itself and attach to other files or programs to potentially harm a computer. It notes viruses can spread between computers by transferring infected files via email, USB drives, or other sources. The document stresses the importance of taking precautions like using antivirus software, keeping it updated, and restricting unauthorized access to systems to help prevent virus infections.

Uploaded by

Saurabh Saxena
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
3K views2 pages

Class 7 Computer Science CHAPTER 3 (Computer Viruses)

This document discusses computer viruses and includes questions and answers about them. It defines a computer virus as a program that can copy itself and attach to other files or programs to potentially harm a computer. It notes viruses can spread between computers by transferring infected files via email, USB drives, or other sources. The document stresses the importance of taking precautions like using antivirus software, keeping it updated, and restricting unauthorized access to systems to help prevent virus infections.

Uploaded by

Saurabh Saxena
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

CLASS VII

COMPUTER SCIENCE
CHAPTER-3 (COMPUTER VIRUSES)
** Students are instructed to copy the following answers of the exercise in
your computer class booklets.**

1. FILL IN THE BLANKS


a. Off
b. Destructive
c. Write-protected
d. Slower
e. Program
f. Macro
g. Malware
h. Trojan Horse
2. STATE TRUE OR FALSE
a. True
b. False. It should be kept updated on regularly.
c. True
d. True
e. False. It harms our computer.
f. True
g. False. Computer viruses can infect only software not hardware like keyboard.
h. True
3. CHOOSE THE CORRECT OPTION
a. iii) Both i and ii
b. iv) All of the above
c. iii) Both i and ii
d. iv) All of these
e. i) Michelangelo
f. iii) Data files
g. ii) Spyware
h. i)Spam
4. ANSWER THE FOLLOWING
a. Name the type of virus that infects data files.
ANS: The type of virus that infects data files is Macro Virus
b. What is the name given to a database of viruses that an anti-virus software scans for?
ANS: The name given to the database of viruses that an anti-virus software scans for is
‘Virus Definitions’
c. Define a computer virus. How can it harm your computer?
ANS: A computer virus is a software program that has the ability to make copies of itself
and to attach itself to other programs of files.
A Virus tries to take control of the computer system it has infected and carry out
harmful tasks that it is programmed to do. It also infects new files created on the
infected computers or the contents of the pen-drives or any removable storage media
that are inserted into such computers.
d. Mention any three precautions you should take for protecting your computer from
virus infections.
ANS: Any three precautions that we must take to protect our computers from virus
infections are:
i. We must restrict the access of others to our system, both offline and online.
ii. We must install and use antivirus software and keep it regularly updated.
iii. We must always scan the files that we have downloaded from the Internet.
e. How does a computer virus spread from one computer to another?
ANS: Computer viruses spread from one computer to another by the transfer of infected
data through e-mails, pen drives or other sources.
5. APPLICATION BASED QUESTIONS
a. i) Spam
ii) Spams may carry advertisements or serve as means of spreading malware like viruses
and worms.
iii) Two ways in which it can be avoided are:
 We must not give our e-mail address to unknown people.
 We must delete spams without reading them.
b. i) Deepak’s computer must have been infected by computer virus.
ii) Two other signs that a computer is infected by computer virus are:
 The applications in the computer are taking longer to load and they are not
working properly.
 The computer restarts on its own.
iii) Two rules that will help Deepak are:
 We must restrict access to your system, both online and offline.
 We must install and use antivirus software and update it regularly.
c. i) Antivirus software
ii) Two examples of such software are: Norton Anti-Virus and Quick Heal Total Security
iii) Two rules that must be followed to keep the Antivirus program effective are:
 It should run in the background at all times.
 It should be updated so it recognizes new versions of malicious programs
d. i) EXE files: Program Virus
ii) An Excel document: Macro Virus
iii) Boot records of a hard disk: Boot Virus

*************

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy