Page 412 - IT 402 v2.0 class 10
P. 412
4. A ............................. can be termed as a key of codes that protects our valuable contents documents or files.
5. a ards can be of different types depending on the ............................. and the ............................. in which the employees
work.
ns. . File In ector . https . ntivirus and ntispyware
. assword 5. Industry nvironment
Section B
Su ecti e T e uestions
A. Answer the following questions:
1. What is the need of Internet security?
Ans. Internet security is a branch of computer science that is related to a network and web browser security which helps
to keep the data intact and safe leading to prevention of cyber-attacks. Internet security leads to reduction of data
loss, theft, and damage. It is needed at homes as well as for business houses. It is needed when you are accessing/
uploading information online.
. ist any five cyber threats.
Ans. F ive c y b e r t h r e a t s a r e :
irus
ro an orse
Spyware
Spoofing
hishing
3. What is spyware? How you can prevent the attack of spyware?
ns. Spyware is a program which infects the computer and then collects information data of the computer without
the owner’s knowledge or consent. It gets transmitted to their system through Internet, websites, webpages, and
e-mails or through a network of computers. Key logger is an example of spyware.
o prevent the attack of spyware:
Use anti-spyware software.
Avoid exploring the error dialogues on the Internet.
void using free deal offers on the Internet.
erify the authenticity of a desired program before installing it in your computer.
. hat are the symptoms and effects of a malware
ns. hen malware enters a computer system certain symptoms are reflected. Some of the symptoms are:
Slowdown: The processing speed of the computer decreases.
Pop-ups: Unexpected pop-ups appears on the system.
Crash: he system crashes stops functioning fre uently or SO lue Screen of eath shows up.
Running Out of Storage Space: Malwares occupies huge storage space.
Loss of File: eletes useful files from the computer system.
5. Write a few tips for having a strong password.
ns. he following are a few tips to make strong passwords:
ood password strength can be achieved by inserting different characters into it i.e. don t repeat the characters
in passwords.
410 Touchpad Information Technology-X

