Page 58 - TP_Play_V2.1_class7
P. 58

D.  Long answer type questions.

                     1.  Explain the following malware:
                        a.  Trojan Horse  ....................................................................................................................................................................

                           ...................................................................................................................................................................................................

                        b.  Adware        ....................................................................................................................................................................
                           ...................................................................................................................................................................................................

                     2.  What are the ways we can protect our system from Malware attack?

                        ........................................................................................................................................................................................................
                        .........................................................................................................................................................................................................

                        ........................................................................................................................................................................................................


                                                                                    21 st
                  E.  Competency-based/Application-based questions.              Century   #Technology Literacy
                                                                                   Skills
                     1.   Ravi has brought a pen drive from his friend to share documents. What should he
                        do before sharing to protect his computer?

                     2.   Your friend has been constantly getting offer e-mails on his account for some time. What will you
                        suggest him?
                                                                                             21 st   #Technology Literacy
                                                                                          Century
                                                                                            Skills  #Creativity
                                                         In the lab



                     Open Word and create a document called "Top 3 Antivirus" and write down the names and their
                     features in table format. If possible, use a border and images.



















                   Teacher's Corner

                  1.  Show the students how an antivirus works.
                  2.   Make them revise and remember the difference between virus, malware and antivirus.










                   56       Play (Ver. 2.1)-VII
   53   54   55   56   57   58   59   60   61   62   63