Page 92 - Code & Click - 7
P. 92

B.  Fill in the blanks with the correct answer.

                1.  Melissa, Relax, Concept, and Nuclear are some examples of _________.

                2.  _________  is  the  unauthorised  illegal  activity  to  gain  access  to  computers  and  network
                    resources.
                3.  _________ is the database of viruses and other malware that an antivirus software uses to
                    scan a computer.

                4.  _________ is the unauthorised act of copying or transferring private data that belongs to an
                    organisation or an individual, without their consent.

            C.   Write ‘T’ for True and ‘F’ for False statement.

                1.  A polymorphic virus only infects boot record program in a hard disk.                   _______
                2.  You should always open email attachments after scanning them.                          _______

                3.  Virus can infect files on CD-ROMs and DVD-ROMs.                                        _______
                4.  Computer worms affect the speed of a computer as well as the bandwidth
                    available on a computer network.                                                       _______

            D.  Answer the following questions.

                1.  What is malware? Write any five measures you should follow to protect your computer from
                    malware.
                2.  What is a Trojan Horse?
                3.  Define the following terms:

                    (a) Spam             (b) Phishing         (c) Adware      (d) Hacking         (e) Identity theft
                4.  Write five ways in which malware affects your computer.



              Mind Stretching
             1.  Vikram has installed an antivirus software in his computer and scans his computer regularly
                for viruses. Still, his computer got infected with a virus. What could be the cause for the virus
                infection? How can he avoid the same problem in future?                               Logical Thinking
             2. Give two examples of each:                                                           Critical Thinking

                 (a)  Antivirus software        __________________                  __________________
                 (b)  Spyware                   __________________                  __________________

                 (c)  Adware                    __________________                  __________________
                 (d)  Stealth virus             __________________                  __________________
                 (e)  Computer worms            __________________                  __________________




             Discuss                                                                             Communication Skills

              Can antivirus software protect the computer from all kinds of malware? Discuss with your classmates.



            90
   87   88   89   90   91   92   93   94   95   96   97