Page 39 - iPlus_Ver_2.0_class_7
P. 39

Section B (Subjective)

                 A.  Short answer type questions:
                     1.  What is macro virus?
                     2.  How does a virus infect a computer?
                     3.  Explain the following malware:
                        a.  Trojan horse                                  b.  Backdoor
                     4.  What does MBR stand for?

                 B.  Long answer type questions:
                     1.  What is malware? How does it affect your computer? Mention some types of malware.
                     2.  Differentiate between virus and worm.
                     3.  Write any two symptoms of an infected computer.
                     4.  What are the ways we can protect our system from malware attack?
                     5.  Mention some of the most dangerous malwares known.

                 C.  Competency-based/Application-based questions:
                     1.  Ravi has brought a pen drive from his friend to share documents. What should he do before
                        sharing to protect his computer?

                     2.  Your friend has been constantly getting offer e-mails on his account for some time. What will you
                        suggest him?


                                                                                     #Problem Solving & Logical Reasoning
                          Crack The Code                                             #Digital Literacy



                  A.  Guess my name.
                      1.  My name resembles a microorganism. My prime motive is not to
                         cause damage, but to clone myself on the host system.                       ................................
                      2.  I specialise in concealing myself. Though, I belong to the
                         cyber world, my name has its roots in Greek mythology.                      ................................
                      3.  I do not collect information from the computer. I wait for the
                         hacker to give me commands.                                                 ................................
                      4.  I am also known as a file-infecting virus that infects executable files.      ................................
                      5.  I can separate all the infected files and applications so that the
                         infection cannot spread further.                                            ................................
                  B.  Find the names of five malware programs in the grid.

                                          A    I   I   B    A   C   K    D   O   O    R    I

                                          T    L   K   A    R   O   K    L   W   U    B   T
                                          O    I   E   T   O    N   T    R   O    J   A   N

                                          A   R    O   O    T   K    I   T   R   N    B   H
                                           I  M    T   C    T   T   E    K   M N      I   E

                                          W    S   P   Y   W    A   R    E   M    Y   T   R
                                          E    L   O   A    I   L   M    I   A    R   W   S




                                                                                                                  37
                                                                                                Computer Virus
   34   35   36   37   38   39   40   41   42   43   44