Page 88 - Trackpad v5 class 5
P. 88

1.  Tick ( ) the correct option.
                a.  Which of the following software is harmful to the computer?

                   (i)  System software          (ii)  Application software           (iii)  Malicious software
                b.  Which type of malware attaches itself to files and infects our computer?

                   (i)  Worm                     (ii)  Virus                          (iii)  Trojan horse
                c.  Which of the following conceals itself?

                   (i)  Trojan horse             (ii)  Worm                           (iii)  Virus
                d.  Which software is used to protect a computer from different types of malware?

                   (i)  Word processing          (ii)  Multimedia player              (iii)  Antivirus

            2.  Answer in one or two words.

                a.   What is the cause of the appearance of new files with strange
                   names called?                                                                  ____________
                b.  Name any one popular antivirus software.                                      ____________

                c.  Which was developed by Symantec Corporation?                                  ____________
                d.   Name the type of malware that gathers information about the users
                   after getting installed on a computer.                                         ____________


            3.  Think and answer.
                a.  Why should we update our antivirus program regularly?
                   _____________________________________________________________________________

                b.   How can we avoid virus infection in our computers?
                   _____________________________________________________________________________
                c.   How does an antivirus program work?

                   _____________________________________________________________________________
                   _____________________________________________________________________________

                d.   How do Trojan horses work?
                   _____________________________________________________________________________
                   _____________________________________________________________________________

                e.   How do you protect your computer?
                   _____________________________________________________________________________

                   _____________________________________________________________________________






             86   Pro (Ver. 5.0)-V
   83   84   85   86   87   88   89   90   91   92   93