Page 120 - Computer - 7
P. 120
Mobile malware is malicious software specifically designed to target mobile devices, such as
smartphones and tablets, with the goal of gaining access to private data.
Smishing is a phishing cybersecurity attack carried out over mobile text messaging, also known
as SMS phishing.
Hacking is an unauthorised illegal activity to gain access to computers and network resources.
Virus Definition is the database of viruses and other malware that an antivirus software uses to
scan a computer.
INFO RETENTION
INFO RETENTION
A. Select the correct option for each of the following statements.
1. A utility software designed to protect the computer from malware is ______.
(a) Antivirus software (b) Antimalware software
(c) Antiworms software (d) Antiattack software
2. A virus that infects program files in a computer is ______.
(a) Multipartite Virus (b) Macro Virus (c) Software Virus (d) Program virus
3. A virus designed to avoid detection by antivirus software is ______.
(a) Stealth Virus (b) Boot Sector Virus (c) Polymorphic Virus (d) Trojan horse
4. Unsolicited and unwanted email usually sent by companies to advertise and sell their products
is called ______.
(a) Spyware (b) Spam (c) Adware (d) Junk
5. The act of stealing a user’s online identity to send messages and email from his online profile is
called ______.
(a) Identity theft (b) Data theft (c) Phishing (d) Vishing
B. Fill in the blanks with the correct answer.
1. Melissa, Relax, Concept, and Nuclear are some examples of _________.
2. _________ is the unauthorised illegal activity to gain access to computers and network resources.
3. _________ is the database of viruses and other malware that an antivirus software uses to scan
a computer.
4. Beast, DarkComet, and Zeus are some examples of _________.
5. _________ is the unauthorised act of copying or transferring private data that belongs to an
organisation or an individual, without their consent.
C. Write ‘T’ for True and ‘F’ for False statement.
1. A polymorphic virus only infects boot record program in a hard disk. _______
2. You should always open email attachments after scanning them. _______
118