Page 107 - TP_Play_V2.1_class8
P. 107

C.  Short answer type questions.

                     1.  Define the term 'Authentication'.

                        ...................................................................................................................................................................................................

                        ...................................................................................................................................................................................................

                     2.  What is trojan?
                        ...................................................................................................................................................................................................

                        ...................................................................................................................................................................................................

                     3.  Name some Antivirus softwares.

                        ...................................................................................................................................................................................................

                        ...................................................................................................................................................................................................

                 D.  Long answer type questions.


                     1.  What is the use of antivirus program?

                        ...................................................................................................................................................................................................

                        ...................................................................................................................................................................................................

                     2.  What is malware? Mention some types of malwares.

                        ...................................................................................................................................................................................................

                        ...................................................................................................................................................................................................

                        ...................................................................................................................................................................................................

                     3.  Differentiate between virus and worm.

                        ...................................................................................................................................................................................................

                        ...................................................................................................................................................................................................

                        ...................................................................................................................................................................................................


                 E.  Guess my name.
                     1.   My name resembles a micro organism. My prime motive is not to cause damage

                        but clone myself on the host system.                                              .....................

                     2.   I specialise in concealing myself. Though, I belong to cyber world but my name
                        has its roots in Greek mythology.                                                 .....................

                     3.   I do not collect information from the computer. I wait for the hacker to give me
                        commands.                                                                         .....................




                                                                               Computer Safety and Security      105
   102   103   104   105   106   107   108   109   110   111   112