Page 75 - CA_165_V2.0_C9_Flipbook
P. 75
3. How is an adware different from a spyware?
Ans. Spywares are programs which infect and collect information of the computer without the owner’s
knowledge or consent but an adware or an advertising supported software is an unwanted software that
hides on the system and appears in form of pop up advertisement on your screen.
4. What are Cookies? What information do they store?
Ans. Cookies are the files that are temporarily downloaded from a website and are stored on the local computer
when a person visits that website. Cookies are meant for storing the information related to activities
performed during previous browsing such as login details, details of a shopping cart, visited pages of a
website, etc.
5. Define the term Identity Protection.
Ans. Identity Protection refers to safety practices to prevent theft of personal information such as personal
profile, bank account details, address details, family details and also to prevent from obtaining credit card
benefits, ordered goods, passports, driving licenses, etc. by other person.
C. Long answer type questions.
1. What is Cyber Safety? Discuss the steps that can be undertaken to minimise the risk of Cyber attacks.
Ans. Cyber safety is a measure to prevent or safeguard from cybercrimes or cyber attacks. It enables us to
keep our personal information or data intact & secure and also protects organisations or individuals from
unauthorised access or manipulation of information. The steps that can be undertaken to minimise the risk
of cyber attacks:
● Do not share Personal Information
● Avoid using Unsecured Wi-Fi
● Don’t Accept Unknown Invitation
● Use Antivirus and Antispyware Software
2. Explain in detail the actions that we can take against a Cyber stalker.
Ans. To take action against the stalker, you should:
● Keep Evidence: Do not delete any email or other messages of the stalker and also keep a printout of
the same.
● Save all records: If there is any written threat by the stalker then keep it as a record. If the threats have
been verbal only, then keep a record of the date, time and circumstances of those threats.
● Contact stalker’s ISP: If Internet Service Providers (ISP) have concrete proof that any of their users has
been using their service for harassing others, then they should immediately stop providing services to
such people.
● Keep Records: Keeps a record of all the complaints that you have made to an ISP or agency and also
safely keep their official reports for future use.
3. What are the effects of Malware Infection?
Ans. There are certain symptoms that hint that a computer has been infected by malware & virus, like:
● Slowdown: Fall in speed of processing of computer.
● Pop-ups: Appearance of unexpected pop-ups on the system.
● Crash: Frequent crashing of system or BSOD (Blue Screen of Death).
● Running Out of Storage Space: Occupying huge space of storage.
● Loss of File: Abrupt deletion of files of a computer system.
Cyber Safety 73

