Page 71 - CA 165 ver 1.0 Class 9
P. 71

4.   Which program silently infect the computer and corrupt the files of a host computer?
 Solved Exercise         i.  Spyware                                         ii.  Virus
                         iii.  Spam                                          iv.  Trojan Horse
                     5.   Which of the following is not a malware?
 PART A
                         i.  Koobface                                        ii.  Ballpit
 A.  Very short answer type questions.
    1.     Name the crime which involves use of the Internet to harass or threaten other people on the network, by         iii.  Firewall   iv.  Sasser
 following them online.
                     Ans. 1. ii    2. i    3. iii    4. iv    5. iii
    2.   What is misuse of data and resources available online called?

    3.     Name the malware that replicates itself inside the computer’s memory and slows down the functioning of
 the computer.                                                  PART B

    4.     What is an unwanted computer program which can be injected into a network to infect and slow down the   A.  Short answer type questions.
 systems called?     1.   What is meant by Cyber Crime?

    5.   Name the malware that intrudes into a computer and quietly steals the data without the user’s consent.     Ans.  Tampering, stealing and manipulating the information, unauthorised use of data or intrusions that lead to
    6.   What is unwanted and unsolicited messages sent for the purpose of advertisement or promotion called?  image alteration causing loss & problem in someone’s life by using the resources of internet is ‘Cybercrime’.
    7.   Give an example of a spyware.     2.   Give two uses of a Firewall system.
                     Ans. Two uses of a Firewall system are:
    Ans. 1. Cyberstalking    2. Cyber Crime    3. Worms    4. Virus    5. Spyware    6. Spam
                         ●   It analyzes the network traffic (flow of data) and determines whether the traffic should be allowed or
 7. Keylogger
                             not in the network.
 B.  Fill in the blanks.        ●  It also blocks unauthorised users to access data on the system.
    1.   .................................... is a measure to prevent oneself from cyber crimes or cyber attacks.     3.   How is an adware different from a spyware?
    2.   .................................... refers to the safety practices followed to prevent theft of personal information.     Ans.  Spywares  are  programs  which  infect  and  collect  information  of  the  computer  without  the  owner’s
    3.   .................................... is the hardware or software component that keeps a network secure.  knowledge or consent but an ‘adware’ or an ‘advertising supported software’ is an unwanted software

    4.   .................................... are meant to store information related to the activities performed during web browsing.  that hides on the system and appears in form of pop up advertisement on your screen.
    5.     A ................................. is a key of codes that keeps our content secure by authenticating a person before      4.     What are Cookies? What information do they store?
 granting access.     Ans.  Cookies are the files that are temporarily downloaded from a website and are stored on the local computer
    6.   .................................... means to keep the data secure by restricting unauthorised access.  when  a  person  visits  that  website.  Cookies  are  meant  for  storing  the  information  related  to  activities
                         performed during previous browsing such as login details, details of a shopping cart, visited pages of a
    Ans. 1. Cyber Safety    2. Identity Protection    3. Firewall    4. Cookies    5. Password
                         website, etc.
       6. Confidentiality        5.     Define the term ‘Identity Protection’.

 C.  Case Based MCQs     Ans.  ‘Identity Protection’ refers to safety practices to prevent theft of personal information such as personal
      Malware refers to infectious programs that hampers the functioning of a computer system. It is unwanted   profile, bank account details, address details, family details and also to prevent from obtaining credit card
 software which is designed to damage a computer system.  benefits, ordered goods, passports, driving licenses, etc. by other person.
    1.   Which computer programs or algorithms slow down the functioning of a computer?  B.  Long answer type questions.
       i.  Virus   ii.  Worms     1.     What is Cyber Safety? Discuss the steps that can be undertaken to minimize the risk of Cyber attacks.
       iii.  Trojan Horse   iv.  None of the above     Ans.  Cyber safety is a measure to prevent or safeguard from cybercrimes or cyber attacks. It enables us to
    2.   Which one is the example of a spyware?  keep our personal information or data intact & secure and also protects organizations or individuals from
       i.  Keylogger   ii.  Byte Bandit  unauthorised access or manipulation of information. The steps that can be undertaken to minimize the risk
       iii.  Mydoom   iv.  Infostealer.Kronbank  of cyber attacks:

    3.     .................................... refers to an unwanted and unsolicited message which is received in the inbox of a         ●  Do not share Personal Information
 person’s e-mail account or in newsgroups.        ●  Avoid using Unsecured Wi-Fi
       i.  Boot Sector Virus   ii.  Program File Virus        ●  Don’t Accept Unknown Invitation
                         ●  Use Antivirus and Antispyware Software
       iii.  Spam   iv.  Spyware

                                                                                                 Cyber Safety    69
   66   67   68   69   70   71   72   73   74   75   76