Computer (Ln 3,4) Bookback
Computer (Ln 3,4) Bookback
3 - COMPUTER VIRUS
EXERCISES
A Fill in the blanks.
1. A Macro Virus is a program that infects a computer by attaching its itself
to another program.
2. Hackers are harmless computer enthusiasts \Vhile Crackers are
dangerous people v~ho cause harm to computer systems.
3. Melissa and Bablas are examples of macro viruses
4 . We must have antivirus software to block junk e-mails I
S. Quickheal and Norton's are popular antivirus programs.
8. Write Tfor the true statements and Ffor the false storements.
1. Trojan Horse is a mal\tare- True
2. QuickHeal is a free do\·,n•oad and antivirus softv...are-False
3. Every time you boot your computer ,the macro virus gets into action-
False
t.. A firev1all can cause damage to your computer- False
5. Hackers are more dangerous than crackers- False
C. Choose the correct answer.
1. A program virus affects files having t he extension
a. Exe
b. Doc
c. Pptx
d. Jpeg
2. Polyboot.B and AntiExe are examples of I
a. Macro virus
b. Program virus
c. Boot-sector virus
d. None of these
3. To steal information from another computer JPone '1vculd use a
a. Mal \Va re
1
1
a. Us,e filters
b. 0 pen spam mail and check them
1
3. When cybercriminals steal your net banking password by sendlng a fraud e-mail Phlshlng~
4. When someone publishes a poem dmvnloaded from the internet as his/her own Plaejarjsm.
7. Practices to protect your personal information and compute from attacks Cyber safety.
10. Online right that a person or a company has over its own plans, ideas, music, artistic creations or
other non-material assets Intellectual Property Rights,
B. FiTI 1ln the blanks.
z. Wrusl!! tih at pretend t,a , be he 1pf1d pragrams but de.stray yaur data ■ re caHed Trai11n Horse.
1
1
S.. When we us_e a soda I ne1wa~kln1 site. we le,a ve behind DlgJral Foorsrlnrs.
1 1
&. 5aftwar@ Piracy is lh1e Hlegal capvtr,~ distribution ar use af llce1n sed software.,
C. E.:plaln lhll! folfow1
l n1 ll!rms.
L Firewall - A flr■w,,11 is • net\Vol'k security system wh\d, prevents unau1hon,1,e d people hom
accessln1 ■ private netwark.. Flrew ■ U are created usin1 hardwar,e and sa,hware.
,1 . Trojans --Trojans BR' viruses that pretend 'IO be helplul pr01rams bul destroy our data, damag1
lng
our c,a mpuler and stealing aur persanal infarm1l1an.
3 .. Spyware ... 5pyware ■re m ■ lware(,m11Uciaus sohw ■re}1 that uadt our anUne activities.
4. Dlclt:al Footprints- It ts a record of everything an Individual does onllne, lnc.ludlng the co ntent
he/she uploads. These digital footprints are very difficult remove.
S. Hacker - A hacker Is any highly skilled computer expert capable of breaking int o computer systems
a nd network using bugs, codes and viruses.
a. Yes D b. Accept 0
C. Cancel D d. the red X in the corner g
2. If you face any form of cybercrime or cyberbullying, you must
a. viruses 0 b. worms D
c. Trojans D d. all of these Q
4. To avoid spam
a. a cybercrime
(3 b. a way of writing e-mails 0
uploading video 0 d. updating an online journal CJ
c.
.J •
E. Write True ar Ra~l!-
Ans. They are u-sed by buslnenes and educational Institutions that need to protect a large network
of comput.e rs, servers, employees and studenb.
Ans.
Advantages:
a. The lntemet Is a store~se of Information. Powerful search engines enable us to get the
right lnform1tlon quickly and easily.
b. The internet enables oollaboratlve work, that ls, many people can work together on
common projects.
Disadvantages:
a. Some people get addicted to the Internet. It Isolates them from society.
Ans. It refers to the various rights of Individuals In the cyber wor1d. There are cyber laws which
protect the online privacy of people and all their personal lnfom,atlon. Anyone or any organizati on who
vlolates the privacy and personal data of citizens must be punished.
Ans. We must not retallate but report toJ:our teacher or parent Immediately.
5. What are the safety measures one should take with passwords?
Ans. Create smart passwords. Never share them with anyone. Change passwords regularly. Don't
use the same passwords for cntical accounts.