Page 107 - TP_Play_V2.1_class8
P. 107
C. Short answer type questions.
1. Define the term 'Authentication'.
...................................................................................................................................................................................................
...................................................................................................................................................................................................
2. What is trojan?
...................................................................................................................................................................................................
...................................................................................................................................................................................................
3. Name some Antivirus softwares.
...................................................................................................................................................................................................
...................................................................................................................................................................................................
D. Long answer type questions.
1. What is the use of antivirus program?
...................................................................................................................................................................................................
...................................................................................................................................................................................................
2. What is malware? Mention some types of malwares.
...................................................................................................................................................................................................
...................................................................................................................................................................................................
...................................................................................................................................................................................................
3. Differentiate between virus and worm.
...................................................................................................................................................................................................
...................................................................................................................................................................................................
...................................................................................................................................................................................................
E. Guess my name.
1. My name resembles a micro organism. My prime motive is not to cause damage
but clone myself on the host system. .....................
2. I specialise in concealing myself. Though, I belong to cyber world but my name
has its roots in Greek mythology. .....................
3. I do not collect information from the computer. I wait for the hacker to give me
commands. .....................
Computer Safety and Security 105

