Page 39 - iPrime_V2.2_class7
P. 39

C.  Fill in the blanks using the words given below:

                                               Hints


                                                    antivirus, firewall, worm, trojan horse


                    1.  A  ................................ is a  type  of  malware  that  can  replicate  itself without  any  human
                       interaction.

                    2.  A program that identify and remove malware is  known as an ................................ software.

                    3.  A ................................ acts like a gatekeeper and prevents unauthorised access to a computer
                       network.

                    4.  The purpose of a ................................ is to conceal itself inside a software that seems legitimate.



                  Let's Do            It                                                    Section B (Subjective)




                 A.  Short answer type questions.
                    1.  What is a trojan?
                    2.  What is the use of an antivirus program?

                    3.  What is a boot sector virus?

                    4.  What does MBR stand for?

                 B.  Long answer type questions.
                    1.  What is malware? How does this affect your computer? Mention some types of malware.

                    2.  Differentiate between a virus and a worm.
                    3.  How do you know if your computer has a virus?

                    4.  What measures can be taken to prevent a virus attack?

                 C.  Application-based questions.
                    1.  Neha  connected  a  USB  drive,  and  her  computer  started  acting  abnormally,  with  files

                       disappearing and strange new files appearing. Could this be a virus? What steps should
                       she take to recover her data and prevent further issues?

                    2.  Anil found that sensitive files on his computer have been encrypted, and
                       a ransom message is asking for payment to unlock them. Could this be a
                       ransomware attack? What actions should Anil take to recover his files and
                       protect his system?









                                                                                                Computer Virus     37
   34   35   36   37   38   39   40   41   42   43   44