Page 75 - CA_165_V2.0_C9_Flipbook
P. 75

3.   How is an adware different from a spyware?
                     Ans.  Spywares  are  programs  which  infect  and  collect  information  of  the  computer  without  the  owner’s
                         knowledge or consent but an adware or an advertising supported software is an unwanted software that
                         hides on the system and appears in form of pop up advertisement on your screen.
                     4.     What are Cookies? What information do they store?
                     Ans.  Cookies are the files that are temporarily downloaded from a website and are stored on the local computer
                         when  a  person  visits  that  website.  Cookies  are  meant  for  storing  the  information  related  to  activities
                         performed during previous browsing such as login details, details of a shopping cart, visited pages of a
                         website, etc.
                     5.     Define the term Identity Protection.
                     Ans.  Identity Protection refers to safety practices to prevent theft of personal information such as personal
                         profile, bank account details, address details, family details and also to prevent from obtaining credit card
                         benefits, ordered goods, passports, driving licenses, etc. by other person.
                 C.  Long answer type questions.
                     1.     What is Cyber Safety? Discuss the steps that can be undertaken to minimise the risk of Cyber attacks.

                     Ans.  Cyber safety is a measure to prevent or safeguard from cybercrimes or cyber attacks. It enables us to
                         keep our personal information or data intact & secure and also protects organisations or individuals from
                         unauthorised access or manipulation of information. The steps that can be undertaken to minimise the risk
                         of cyber attacks:

                         ●  Do not share Personal Information
                         ●  Avoid using Unsecured Wi-Fi
                         ●  Don’t Accept Unknown Invitation
                         ●  Use Antivirus and Antispyware Software
                     2.   Explain in detail the actions that we can take against a Cyber stalker.

                     Ans. To take action against the stalker, you should:
                         ●   Keep Evidence: Do not delete any email or other messages of the stalker and also keep a printout of
                             the same.
                         ●   Save all records: If there is any written threat by the stalker then keep it as a record. If the threats have
                             been verbal only, then keep a record of the date, time and circumstances of those threats.
                         ●   Contact stalker’s ISP: If Internet Service Providers (ISP) have concrete proof that any of their users has
                             been using their service for harassing others, then they should immediately stop providing services to
                             such people.
                         ●   Keep Records: Keeps a record of all the complaints that you have made to an ISP or agency and also
                             safely keep their official reports for future use.
                     3.   What are the effects of Malware Infection?
                     Ans.  There are certain symptoms that hint that a computer has been infected by malware & virus, like:

                         ●  Slowdown: Fall in speed of processing of computer.
                         ●  Pop-ups: Appearance of unexpected pop-ups on the system.
                         ●  Crash: Frequent crashing of system or BSOD (Blue Screen of Death).
                         ●  Running Out of Storage Space: Occupying huge space of storage.

                         ●  Loss of File: Abrupt deletion of files of a computer system.




                                                                                                 Cyber Safety    73
   70   71   72   73   74   75   76   77   78   79   80