Page 88 - TP_Prime_V2.2_Class7
P. 88

b.  Which of the following programs damages our computer?
                         (i)   Antivirus                               (ii)   Firewall

                         (iii)  Malware                                (iv)  Norton

                      c.  Identify the software which controls incoming and outgoing network traffic.

                         (i)   Firewall                                (ii)   Ransom
           Prime (Ver. 2.2)-VII         d.   Which virus transmits from one computer to another through e-mails?                                                                                                                                        COMPUTER VIRUS
                         (iii)  Norton
                                                                       (iv)  Antivirus




                         (i)   Boot Sector Virus
                                                                       (ii)   File-infecting Virus
                                                                       (iv)  Norton

                         (iii)  E-mail Virus

                      e.   Which of the following types of malware primarily functions to monitor a user's activity
                         and send the gathered information back to a hacker?

          86             (i)   Trojan Horse                            (ii)   Worms                                                                                                                                                                   87

                         (iii)  Spyware                                (iv)  E-mail Virus


                  2.  Write ‘T’ for true and ‘F’ for false.
                      a.  A virus cannot replicate itself.                                                  ________

                      b.  AVG is a malware program.                                                         ________

                      c.  Ransomware is an antivirus software.                                              ________
                      d.  We should scan our computer regularly.                                            ________


                      Evaluation Time


                  1.  Fill in the blanks using the hints given below:


                                              Antivirus, Firewall, Malware, Trojan Horse


                      a.  Malacious software is known as _____________.

                      b.   A  set  of  programs  that  identify  and  remove  malware  is  known  as  _____________
                         software.

                      c.   A _____________ acts like a gatekeeper and prevents unauthorised access to a computer
                         network.

                      d.   The  purpose  of  a  _____________  is  to  conceal  itself  inside  the  software  that  seems
                         legitimate.
   83   84   85   86   87   88   89   90   91   92   93