Page 92 - Code & Click - 7
P. 92
B. Fill in the blanks with the correct answer.
1. Melissa, Relax, Concept, and Nuclear are some examples of _________.
2. _________ is the unauthorised illegal activity to gain access to computers and network
resources.
3. _________ is the database of viruses and other malware that an antivirus software uses to
scan a computer.
4. _________ is the unauthorised act of copying or transferring private data that belongs to an
organisation or an individual, without their consent.
C. Write ‘T’ for True and ‘F’ for False statement.
1. A polymorphic virus only infects boot record program in a hard disk. _______
2. You should always open email attachments after scanning them. _______
3. Virus can infect files on CD-ROMs and DVD-ROMs. _______
4. Computer worms affect the speed of a computer as well as the bandwidth
available on a computer network. _______
D. Answer the following questions.
1. What is malware? Write any five measures you should follow to protect your computer from
malware.
2. What is a Trojan Horse?
3. Define the following terms:
(a) Spam (b) Phishing (c) Adware (d) Hacking (e) Identity theft
4. Write five ways in which malware affects your computer.
Mind Stretching
1. Vikram has installed an antivirus software in his computer and scans his computer regularly
for viruses. Still, his computer got infected with a virus. What could be the cause for the virus
infection? How can he avoid the same problem in future? Logical Thinking
2. Give two examples of each: Critical Thinking
(a) Antivirus software __________________ __________________
(b) Spyware __________________ __________________
(c) Adware __________________ __________________
(d) Stealth virus __________________ __________________
(e) Computer worms __________________ __________________
Discuss Communication Skills
Can antivirus software protect the computer from all kinds of malware? Discuss with your classmates.
90