Page 40 - Trackpad_ipro 4.1_Class7
P. 40
4. How can a virus be prevented from causing damage?
...................................................................................................................................................................................
...................................................................................................................................................................................
...................................................................................................................................................................................
C. Application-based questions.
1. Neha connected a USB drive, and her computer started acting abnormally, with files
disappearing and strange new files appearing. Could this be a virus? What steps should
she take to recover her data and prevent further issues?
2. Anil found that sensitive files on his computer have been encrypted, and a
ransom message is asking for payment to unlock them. Could this be a
ransomware attack? What actions should Anil take to recover his files and
protect his system?
Higher Order Thinking Skills (HOTS) #Coding and Computational Thinking
1. What could cause a computer to exhibit strange behavior such as slow startup and unusual
error messages? Could it be due to a virus? If so, explain how a virus could cause these
symptoms and identify potential types of viruses that could be responsible.
2. What steps should be taken to protect a computer that is running slower than usual and
occasionally displays strange pop-up ads? Could this be a potential malware issue? Explain
the necessary actions to safeguard the system.
Crack The Code #Problem Solving & Logical Reasoning
#Coding & Computational Thinking
A. Find the names of five malware programs in this grid.
A I I B A C K D O O R I
T L K A R O K L W U B T
O I E T O N T R O J A N
A R O O T K I T R N B H
I M T C T T E K M N I E
W S P Y W A R E M Y T R
E L O A I L M I A R W S
B. Guess my name.
1. My name resembles a microorganism. My prime motive is not to
cause damage, but to clone myself on the host system. ................................
2. I specialise in concealing myself. Though, I belong to the
cyber world, my name has its roots in Greek mythology. ................................
38 iPro (Ver. 4.1)-VII

