Page 38 - iPlus_Ver_2.0_class_7
P. 38

4.  Which of the following is a type of malware?

                         a. Norton                                       b. AVG

                         c. Trojan horse                                 d. None of these
                      5.  Which of the following is/are harms caused by computer viruses?

                         a. Viruses can crash your hard disk

                         b. Viruses can destroy all or some of your data

                         c. Viruses decrease the processing speed of the computer

                         d. All of these
                      6.  Which of the following is a type of computer virus that is transmitted from one computer to
                         another through e-mail messages?

                         a. E-mail                                       b. File-infecting

                         c. Boot sector                                  d. Norton
                      7.  What does ”VIRUS“ stand for?

                         a. Vital Information Resources Under Seize
                         b. Virtual Information Resources Under Seize


                         c. Virtual Immune Resources Under Seize
                         d. Vital Immune Resources Under Seize

                      8.  Which of the following activities does an infected computer system do?
                         a. Start displaying unusual messages on the screen

                         b. Load the programs late

                         c. Take more time to shut down the windows

                         d. All of these

                  B.  Fill in the blanks using the words given below.

                                             Hints: antivirus, firewall, malware, trojan horse
                      1.  Malicious software is also known as ................................ .
                      2.  A set of programs that identify and remove malware is known as ................................ software.

                      3.  A ................................ acts like a gatekeeper and prevents unauthorised access to a computer network.
                      4.  The purpose of a ................................ is to conceal itself inside software that seems legitimate.
                  C.  Write ‘T’ for true and ‘F’ for false.
                      1.  A virus cannot replicate itself.                                             ................................
                      2.  AVG is a malware program.                                                    ................................

                      3.  A worm slows down the functioning of a computer.                             ................................
                      4.  We should scan our computer regularly.                                       ................................
                      5.  Downloading from a non-secured website can cause harm to your computer.      ................................


                    36
                         iPlus (Ver. 2.0)-VII
   33   34   35   36   37   38   39   40   41   42   43