Page 88 - TP_Prime_V2.2_Class7
P. 88
b. Which of the following programs damages our computer?
(i) Antivirus (ii) Firewall
(iii) Malware (iv) Norton
c. Identify the software which controls incoming and outgoing network traffic.
(i) Firewall (ii) Ransom
Prime (Ver. 2.2)-VII d. Which virus transmits from one computer to another through e-mails? COMPUTER VIRUS
(iii) Norton
(iv) Antivirus
(i) Boot Sector Virus
(ii) File-infecting Virus
(iv) Norton
(iii) E-mail Virus
e. Which of the following types of malware primarily functions to monitor a user's activity
and send the gathered information back to a hacker?
86 (i) Trojan Horse (ii) Worms 87
(iii) Spyware (iv) E-mail Virus
2. Write ‘T’ for true and ‘F’ for false.
a. A virus cannot replicate itself. ________
b. AVG is a malware program. ________
c. Ransomware is an antivirus software. ________
d. We should scan our computer regularly. ________
Evaluation Time
1. Fill in the blanks using the hints given below:
Antivirus, Firewall, Malware, Trojan Horse
a. Malacious software is known as _____________.
b. A set of programs that identify and remove malware is known as _____________
software.
c. A _____________ acts like a gatekeeper and prevents unauthorised access to a computer
network.
d. The purpose of a _____________ is to conceal itself inside the software that seems
legitimate.

