Page 74 - TechPluse_C7_Flipbook
P. 74

D.    Short answer type questions.

                        1.  What is meant by authentication? What are the types of authentication?
                             ...........................................................................................................................................................................

                        2.  What is trojan?
                             ...........................................................................................................................................................................

                        3.  What is the use of antivirus program?
                             ...........................................................................................................................................................................
                  E.    Long answer type questions.
                        1.  How will you keep your computer physically fit?
                        2.  What is malware? How does it affect your computer? Mention some types of malwares.
                        3.  Differentiate between virus and worm.

                                                         Mind Boggler



                  A.    Guess my name.
                        1.  My name resembles a micro organism. My prime motive is not                Experiential Learning
                            to cause damage but clone myself on the host system.
                        2.  I specialise in concealing myself. Though, I belong to cyber world but my name has its roots in
                            Greek mythology.
                        3.  I do not collect information from the computer. I wait for the hacker to give me commands.
                        4.  I am used to collect money by the attacker from the victim to release data.
                                                                                                      Critical Thinking
                  B.    Find the names of five malware programs in this grid.

                                             A   I   I   E   R   D    I   I   A   B   A    I
                                             T   V   K   A   R   O    K   L   W   U   B    T
                                            O    I   E   T   O   N    T   R   O   J   A   N

                                             A   R   O   O   T   K    I   T   R   N   B   H
                                             I   U   T   C   T   T    E   K   M   N    I   E

                                            W    S   P   Y   W   A    R   E   M   Y   T   R
                                             E   L   O   A    I   L  M    I   A   R   W    S

                    Lab Session                                                                        Subject Enrichment



                         Discuss in the class about the process of taking the backup of data.
                         Learn how to choose the password for your e-mail account.


                  Teacher's Note


                    1.  Show the process of keeping the computer physically clean.
                    2.  Show how an antivirus works.




               72       Premium Edition-VII
   69   70   71   72   73   74   75   76   77   78   79