Page 109 - TrackpadV1.0_C5_Flipbook
P. 109

1.  Tick ( ) the correct option.

                     a.  Which of the following software is harmful to the computer?

                         (i)  System software           (ii)  Application software        (iii)  Malicious software

                     b.  Which type of malware attaches itself to files and infects our computer?
                         (i)  Worm                      (ii)  Virus                        (iii)  Trojan horse

                     c.   Which of the following conceals itself?

                         (i)  Trojan horse              (ii)  Worm                         (iii)  Virus

                     d.  Which software is used to protect a computer from different types of malware?
                         (i)  Word processing           (ii)  Multimedia player            (iii)  Antivirus


                 2.  Answer in one or two words.

                     a.   What is the cause of the appearance of new files with strange
                          names called?                                                                ____________

                     b.  Name any one popular antivirus software.                                      ____________
                     c.   Which was developed by Symantec Corporation?                                 ____________

                     d.   Name the type of malware that gathers information about the users
                          after getting installed on a computer.                                       ____________

                 3.  Think and answer.
                     a.  Why should we update our antivirus program regularly?

                          ___________________________________________________________________________
                     b.   How can we avoid virus infection in our computers?
                          ___________________________________________________________________________

                     c.   How does an antivirus program work?
                          ___________________________________________________________________________
                          ___________________________________________________________________________

                     d.   How do Trojan horses work?
                          ___________________________________________________________________________
                          ___________________________________________________________________________

                     e.   How do you protect your computer?
                          ___________________________________________________________________________
                          ___________________________________________________________________________





                                                                                               Computer Malware   107
   104   105   106   107   108   109   110   111   112   113   114