Page 76 - CA_165_V2.0_C9_Flipbook
P. 76
● Unusual activity of messages or programs: Automatic opening or closing of a program, abrupt
restarting of a computer and opening of strange or unknown windows during the process of booting.
● Unusual Network Activity: Unusual network activity such as excessive transfer of data even when all
the applications are closed.
4. Discuss several measures to prevent a Virus attack.
Ans. Some of the popular preventive measures to keep virus at bay are:
● Download Information from trusted Websites: Always download contents from a legitimate
website. The web address of such websites start with ‘https’. Untrusted websites might infect the
computer system with virus.
● Installation of Antivirus: Antivirus are remedial software that scan, detect, clean and remove virus
from a computer system. Some antiviruses also help to recover the data which are lost.
● Scanning & Cleaning of Hard Disk: If a user faces some unusual symptoms while operating a
computer, then it must be scanned and also cleaned as it may have been infected by a malware.
● Update the Antivirus: The existing antivirus has to be updated in order to install its latest virus
signature & clean new virus.
D. Application based questions.
1. Nikita wanted to gift her friend sport shoes. So she searched for this item online again and again but she
couldn’t find anything interesting. Her web browser shows him advertisements related to shoes. What
could be the possible reason she is seeing those advertisements?
Ans. Cookies
2. Rakesh has recently joined a new office and is unfamiliar with many people there. He is receiving negative
and demeaning comments on his social media profile, along with unknown emails from unfamiliar sources.
What could be happening to Rakesh?
Ans. Cyber Bullying
SECTION C
(Case-based/Passage-based Type Questions)
Malware refers to infectious programs that hampers the functioning of a computer system. It is unwanted
software which is designed to damage a computer system.
1. Which computer programs or algorithms slow down the functioning of a computer?
i. Virus ii. Worms
iii. Trojan Horse iv. None of these
2. Which one is the example of a spyware?
i. Keylogger ii. Byte Bandit
iii. Mydoom iv. Infostealer.Kronbank
3. .................................... refers to an unwanted and unsolicited message which is received in the inbox of a
person’s e-mail account or in newsgroups.
i. Boot Sector Virus ii. Program File Virus
iii. Spam iv. Spyware
4. Which program silently infect the computer and corrupt the files of a host computer?
i. Spyware ii. Virus
iii. Spam iv. Trojan Horse
74 Touchpad Computer Applications (Ver. 2.0)-IX

