Page 39 - TP_iPlus_V2.1_Class7
P. 39
3. Which of the following is not a correct way to prevent your PC from a virus?
a. Download only legal software
b. Download any attachment without scanning
c. Use the original version of windows
d. Scan pen drive before opening on computer
4. Which malware spread more commonly in computers that are connected on network?
a. Spyware b. Ransomware
c. Worms d. Trojan Horse
5. Who intrudes into a computer and quietly steals the data of the computer?
a. Worms b. Virus
c. Adware d. Spyware
6. Which malicious software is used to access the data of the host system illegally by encrypting it?
a. Antivirus b. Ransomware
c. Spyware d. Rootkit
7. Which malware attacked millions of computers with an email about approaching bad weather?
a. Storm Weather b. Storm Worm
c. Zeus d. Mydoom Worm
8. How can you prevent the attacks of spyware?
a. Use anti-spyware (software)
b. Avoid exploring error dialogs on Internet
c. Ensure the authenticity of a program before installing it on your computer
d. All of these
B. Fill in the blanks using the words given below.
Hints: Greek, Avg, Booting, spyware, Macro
1. ................................ is the process of loading the operating system in the primary memory from the
boot sector.
2. ................................ Virus is primarily designed to infect a specific type of document, such as Word or
Excel files.
3. Keylogger is an example of a ................................ .
4. ................................ is an Antivirus software program.
5. The term ‘trojan’ is derived from the Trojan Horse story in ................................ mythology.
37
Computer Virus

