0% found this document useful (0 votes)
13 views

Computer (Ln 3,4) Bookback

The document discusses various types of computer viruses, including macro viruses, Trojan Horses, and boot-sector viruses, along with their effects and examples. It also covers the differences between hackers and crackers, the importance of antivirus software, and ethical considerations in computing such as cyberbullying and phishing. Additionally, it outlines safety measures to protect against malware and emphasizes the significance of digital privacy.

Uploaded by

chiyotadash
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

Computer (Ln 3,4) Bookback

The document discusses various types of computer viruses, including macro viruses, Trojan Horses, and boot-sector viruses, along with their effects and examples. It also covers the differences between hackers and crackers, the importance of antivirus software, and ethical considerations in computing such as cyberbullying and phishing. Additionally, it outlines safety measures to protect against malware and emphasizes the significance of digital privacy.

Uploaded by

chiyotadash
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

LN.

3 - COMPUTER VIRUS

EXERCISES
A Fill in the blanks.
1. A Macro Virus is a program that infects a computer by attaching its itself
to another program.
2. Hackers are harmless computer enthusiasts \Vhile Crackers are
dangerous people v~ho cause harm to computer systems.
3. Melissa and Bablas are examples of macro viruses
4 . We must have antivirus software to block junk e-mails I
S. Quickheal and Norton's are popular antivirus programs.

8. Write Tfor the true statements and Ffor the false storements.
1. Trojan Horse is a mal\tare- True
2. QuickHeal is a free do\·,n•oad and antivirus softv...are-False
3. Every time you boot your computer ,the macro virus gets into action-
False
t.. A firev1all can cause damage to your computer- False
5. Hackers are more dangerous than crackers- False
C. Choose the correct answer.
1. A program virus affects files having t he extension
a. Exe
b. Doc
c. Pptx
d. Jpeg
2. Polyboot.B and AntiExe are examples of I
a. Macro virus
b. Program virus
c. Boot-sector virus
d. None of these
3. To steal information from another computer JPone '1vculd use a
a. Mal \Va re
1
1

b~ Boot -sector virus


c. A.dv11are
d. Spywa11e

4. To protect au, systems from spam ,'..•1e must


1

a. Us,e filters
b. 0 pen spam mail and check them
1

c,. Collect the spam


d. Disconnect them from the internet
I
5. To lnstaU a fi, e\va11 in your computer ,you need
a. Hardware and software
b. Only sofn•~are
c. Only hard\va,~e
d. None of these
D.. Ansv✓eT th~ follnwing Quesrions.
1. \~hat is a \lirus? What ar·e the Sympcon1s v.Jhen a svstem is inf·e cted by a
virus?
1
• A Vin1s is a pras;ram lhat enlers the campu~er system by
1a nachin1 ttse lf t 0 anather pra1ram and then spreads itself
1
1

auass the system.


• sxm.atams are
o Slaw computer performance
o Une•plalned data la~
o Unusual dis,p la:v an the screen_
1

o Computer festart:5 an its awn


2. What is the d ifference benveen a hacker and cracker?
Hacker are people who use their Cracker are malicious programmers
computer skills to enter into who gain unauthorized access to
computer systems without computer systems for the purpose
authorization of stealing, altering or corrupting
information

3. What is the difference bet\veen a boot-sector virus and a Trojan Horse?


• The Boot Sector Virus hides in the boot sector of the hard d isk.
The Boot sector is the first part of a hard disk that contains data
used to boot or start a computer system.
• Trojan Horse is a program that looks harmless but introduces
viruses into your computer. The Trojan hcrse program discuises
itself as a game or a utility program but when executed, it can
destroy data stored in the computer.
4. Hovi can protect our systems from viruses?
\IJe

• Install a good antivirus software on your computer


• Update operating system and antivirus software regularly.
• Use only trusted sites to download software
• Always scan your CDs,pen drive and flash drives before using
them.

5. Explain the terms: mah.,,are, adv!are, sp;"vare


• Malware refers to a variety of malicious programs.
• Adware d isplays unwanted advertisement when a user is
online.
• Spyware can steal information from another computer
E. What virus has affected the computer in each case?
1. gets activated after you have copied songs from a CD into your
computer- Program Virus
2. gets foaded every time you start your computer- Boot-sector virus
3. gets activated once an e-mail attachment is opened-Spam
4. steals office data from yotJr father's laptop- Crackers
5. pretends to be an antivirus program and Infects your computer-
Trojan Horse
6. displays unwanted advertisements \vhen you sur the internet-
Adware
4 . Ethics and Safety Measures in Computing
A. \\/hat is the term used for each of the follO\ving statements?

1. When people use abusive language on social-media sites Cyberbullying.

2. When you receive junk e-mails Spamming.

3. When cybercriminals steal your net banking password by sendlng a fraud e-mail Phlshlng~

4. When someone publishes a poem dmvnloaded from the internet as his/her own Plaejarjsm.

s. When you get a virus in your e-mail Hacking.

6. When someone dO\vnloads a movie or unauthorized sofuvare ill~ally Sofuvare piracy.

7. Practices to protect your personal information and compute from attacks Cyber safety.

8. A da~erous person \Vho gains unauthorized access to a computer system Cracker,

9. Malware that track your online activities Spyware.

10. Online right that a person or a company has over its own plans, ideas, music, artistic creations or
other non-material assets Intellectual Property Rights,
B. FiTI 1ln the blanks.

1~ Cnckers are peaple who lh ■ve ·false anllne idenlilJes~

z. Wrusl!! tih at pretend t,a , be he 1pf1d pragrams but de.stray yaur data ■ re caHed Trai11n Horse.
1
1

J .. Spyware are saftvlare that track your online adivftfes..

4., A firewall protects a nstwork kom unautharb:ed peop1e.,

S.. When we us_e a soda I ne1wa~kln1 site. we le,a ve behind DlgJral Foorsrlnrs.
1 1

&. 5aftwar@ Piracy is lh1e Hlegal capvtr,~ distribution ar use af llce1n sed software.,
C. E.:plaln lhll! folfow1
l n1 ll!rms.

L Firewall - A flr■w,,11 is • net\Vol'k security system wh\d, prevents unau1hon,1,e d people hom
accessln1 ■ private netwark.. Flrew ■ U are created usin1 hardwar,e and sa,hware.

,1 . Trojans --Trojans BR' viruses that pretend 'IO be helplul pr01rams bul destroy our data, damag1
lng
our c,a mpuler and stealing aur persanal infarm1l1an.

3 .. Spyware ... 5pyware ■re m ■ lware(,m11Uciaus sohw ■re}1 that uadt our anUne activities.
4. Dlclt:al Footprints- It ts a record of everything an Individual does onllne, lnc.ludlng the co ntent
he/she uploads. These digital footprints are very difficult remove.

S. Hacker - A hacker Is any highly skilled computer expert capable of breaking int o computer systems
a nd network using bugs, codes and viruses.

6. Phlshlnc - It Is an a ct by which cybercrlmlnals try to steal confidential Information such as


usernames, pauwords, credit-card details or even money by fraud .

7. Malware - Malware are viruses, worms, Trojans, adware and spyware.


Tick ( ✓) the correct answers.

1. To remove pop-ups while reading a web page, we should click

a. Yes D b. Accept 0
C. Cancel D d. the red X in the corner g
2. If you face any form of cybercrime or cyberbullying, you must

a. retaliate D b. report to your teacher 0


c. tell a friend D d. do nothing D
3. Malware are

a. viruses 0 b. worms D
c. Trojans D d. all of these Q
4. To avoid spam

a. read and delete them D b. reply to the sender D


c. label the mail as spam 0 d. ignore them D
5. Phishing is

a. a cybercrime
(3 b. a way of writing e-mails 0
uploading video 0 d. updating an online journal CJ
c.
.J •
E. Write True ar Ra~l!-

.L. WhUe shapping anline, ii is safer co 1u.se credit cards. True

e -mails have links lhal lead 1a ha1rmful weh_sites.. True


2.. Phlshing 1

3 .. Digital foo~prints are only ·1 empon~' and can be delrtetl,. Fa ls,e

4 .. Making copies af Ucensed software is nat II cybeJcrime.. False

5 . Usin,1 images ham websila=s without pe,misslan is a1crime of Plagiarism. Tr\Je

F. Answer thei f0Uowin1 questions-.


1. Where are flrewalls used?

Ans. They are u-sed by buslnenes and educational Institutions that need to protect a large network
of comput.e rs, servers, employees and studenb.

2. Give two advant11ge1 and disadvantages of the Internet

Ans.

Advantages:

a. The lntemet Is a store~se of Information. Powerful search engines enable us to get the
right lnform1tlon quickly and easily.

b. The internet enables oollaboratlve work, that ls, many people can work together on
common projects.

Disadvantages:

a. Some people get addicted to the Internet. It Isolates them from society.

b. Fake website• are created by swlndler1 to cheat people.


3. What do you understand by Individual right to privacy?

Ans. It refers to the various rights of Individuals In the cyber wor1d. There are cyber laws which
protect the online privacy of people and all their personal lnfom,atlon. Anyone or any organizati on who
vlolates the privacy and personal data of citizens must be punished.

4. What should you do if you face any cyberbullying?

Ans. We must not retallate but report toJ:our teacher or parent Immediately.

5. What are the safety measures one should take with passwords?

Ans. Create smart passwords. Never share them with anyone. Change passwords regularly. Don't
use the same passwords for cntical accounts.

6. How can malware cause ham, to you?


Q llJss
Ans. Malware (malicious software) are viruses, worms, Trojans, adware iand spyware. The
can cause many different types of damage to computers, networks, mobile devices and data.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy