Page 72 - CA 165 ver 1.0 Class 9
P. 72

2.   Explain in detail the actions that we can take against a Cyber stalker.
                      Ans. To take action against the stalker, you should:
                          ●   Keep Evidence: Do not delete any email or other messages of the stalker and also keep a printout of
                              the same.
                          ●   Save all records: If there is any written threat by the stalker then keep it as a record. If the threats have
                              been verbal only, then keep a record of the date, time and circumstances of those threats.
                          ●   Contact stalker’s ISP: If Internet Service Providers (ISP) have concrete proof that any of their users has
                              been using their service for harassing others, then they should immediately stop providing services to
                              such people.
                          ●   Keep Records: Keeps a record of all the complaints that you have made to an ISP or agency and also
                              safely keep their official reports for future use.

                      3.   What are the effects of Malware Infection?
                      Ans.  There are certain symptoms that hint that a computer has been infected by malware & virus, like:
                          ●  Slowdown: Fall in speed of processing of computer.
                          ●  Pop-ups: Appearance of unexpected pop-ups on the system.
                          ●  Crash: Frequent crashing of system or BSOD (Blue Screen of Death).

                          ●  Running Out of Storage Space: Occupying huge space of storage.
                          ●  Loss of File: Abrupt deletion of files of a computer system.
                          ●   Unusual activity of messages or programs: Automatic opening or closing of a program, abrupt
                              restarting of a computer and opening of strange or unknown windows during the process of booting.
                          ●   Unusual Network Activity: Unusual network activity such as excessive transfer of data even when all
                              the applications are closed.
                      4.   Discuss several measures to prevent a Virus attack.

                      Ans. Some of the popular preventive measures to keep virus at bay are:
                          ●   Download Information from trusted Websites:  Always  download  contents  from  a  legitimate
                              website.  The  web  address  of  such  websites  start  with  ‘https’.  Untrusted  websites  might  infect  the
                              computer system with virus.
                          ●   Installation of Antivirus: Antivirus are remedial software that scan, detect, clean and remove virus
                              from a computer system. Some antiviruses also help to recover the data which are lost.
                          ●   Scanning &  Cleaning of Hard  Disk:  If  a  user  faces  some  unusual  symptoms  while  operating  a
                              computer, then it must be scanned and also cleaned as it may have been infected by a malware.
                          ●   Update the Antivirus:  The  existing  antivirus  has  to  be  updated  in  order  to  install  its  latest  virus
                              signature & clean new virus.
                  C.  Application based questions.
                      1.     Nikita wanted to gift her friend sport shoes. So she searched for this item online again and again but she
                          couldn’t find anything interesting. Her web browser shows him advertisements related to shoes. What
                          could be the possible reason she is seeing those advertisements?
                      Ans. Cookies

                      2.     Rakesh has joined the new office and he doesn’t know many people in the office. Someone is posting
                          negative and demeaning comments on his social media profile. He is also getting unknown mails from
                          unknown people. What is happening with Rakesh?

                      Ans. Cyber Stalking

                   70     Touchpad Computer Applications-IX
   67   68   69   70   71   72   73   74   75   76   77