Page 40 - Trackpad_ipro 4.1_Class7
P. 40

4.  How can a virus be prevented from causing damage?

                         ...................................................................................................................................................................................

                         ...................................................................................................................................................................................
                         ...................................................................................................................................................................................

                  C.  Application-based questions.
                      1.  Neha  connected  a  USB  drive,  and  her  computer  started  acting  abnormally,  with  files
                         disappearing and strange new files appearing. Could this be a virus? What steps should
                         she take to recover her data and prevent further issues?

                      2.  Anil  found that sensitive  files  on his  computer have been encrypted, and a
                         ransom message is asking for  payment to unlock them. Could this be a
                         ransomware  attack?  What  actions  should  Anil  take  to  recover  his  files  and
                         protect his system?

                  Higher Order Thinking Skills (HOTS)                               #Coding and Computational Thinking

                  1.   What could cause a computer to exhibit strange behavior such as slow startup and unusual
                      error messages? Could it be due to a virus? If so, explain how a virus could cause these
                      symptoms and identify potential types of viruses that could be responsible.
                  2.   What steps should be taken to protect a computer that is running slower than usual and
                      occasionally displays strange pop-up ads? Could this be a potential malware issue? Explain
                      the necessary actions to safeguard the system.



                    Crack The            Code                                      #Problem Solving & Logical Reasoning
                                                                                   #Coding & Computational Thinking

                  A.  Find the names of five malware programs in this grid.


                                           A    I   I   B    A   C   K    D   O   O    R    I
                                           T    L   K   A    R   O   K    L   W   U    B    T

                                           O    I   E   T   O    N    T   R   O    J   A   N
                                           A    R   O   O    T   K    I   T   R   N    B   H

                                            I  M    T   C    T   T    E   K   M N      I    E
                                           W    S   P   Y   W    A   R    E   M    Y   T   R

                                           E    L   O   A    I   L   M    I   A    R   W    S

                  B.  Guess my name.

                      1.  My name resembles a microorganism. My prime motive is not to
                         cause damage, but to clone myself on the host system.                        ................................

                      2.  I specialise in concealing myself. Though, I belong to the
                         cyber world, my name has its roots in Greek mythology.                       ................................




                    38     iPro (Ver. 4.1)-VII
   35   36   37   38   39   40   41   42   43   44   45