Page 412 - IT 402 v2.0 class 10
P. 412

4.  A ............................. can be termed as a key of codes that protects our valuable contents  documents or files.

            5.   a ards can be of different types depending on the ............................. and the ............................. in which the employees
              work.
           ns.   . File In ector               . https                        .  ntivirus and  ntispyware
                 .  assword                   5. Industry    nvironment



                                                        Section B
                                                Su  ecti e T  e  uestions

        A.  Answer the following questions:
            1.  What is the need of Internet security?
         Ans.  Internet security is a branch of computer science that is related to a network and web browser security which helps
              to keep the data intact and safe leading to prevention of cyber-attacks. Internet security leads to reduction of data
              loss, theft, and damage. It is needed at homes as well as for business houses. It is needed when you are accessing/
              uploading information online.
             .   ist any five cyber threats.
         Ans.  F ive   c y b e r   t h r e a t s   a r e :
                  irus
                 ro an  orse
                Spyware
                Spoofing

                 hishing
            3.  What is spyware? How you can prevent the attack of spyware?
          ns.  Spyware is a program which infects the computer and then collects information data of the computer without
              the owner’s knowledge or consent. It gets transmitted to their system through Internet, websites, webpages, and
              e-mails or through a network of computers. Key logger is an example of spyware.
                 o prevent the attack of spyware:
                Use anti-spyware software.
                Avoid exploring the error dialogues on the Internet.
                 void using free deal offers on the Internet.
                 erify the authenticity of a desired program before installing it in your computer.

             .   hat are the symptoms and effects of a malware
          ns.   hen malware enters a computer system certain symptoms are reflected. Some of the symptoms are:
                Slowdown: The processing speed of the computer decreases.
                 Pop-ups: Unexpected pop-ups appears on the system.
                 Crash:  he system crashes  stops functioning  fre uently or  SO    lue Screen of  eath  shows up.
                Running Out of Storage Space: Malwares occupies huge storage space.
                Loss of File:  eletes useful files from the computer system.
            5.  Write a few tips for having a strong password.

          ns.   he following are a few tips to make strong passwords:
                  ood password strength can be achieved by inserting different characters into it  i.e.  don t repeat the characters
                in passwords.




         410       Touchpad Information Technology-X
   407   408   409   410   411   412   413   414   415   416   417