CLASS VIII CHAPTER 8 COMPUTER MALWARE
CLASS VIII
COMPUTER MALWARE
A. Fill in the
blanks with the help of the given words.
1. SPYWARE.. is a program that is put in
someone’s computer, to secretly gather information about the user and spread it
to those with harmful intentions.
2. ……VIRUS………….infects Microsoft Word or Microsoft
applications that provide support for Macros (a sequence of steps).
3. …WORMS…………infect and multiply without
targeting and infecting specific files already present on the computer.
4. …HACKER….tries to break into your computer
system to get information or destroy it.
5. …ANTIVIRUS………………software are used to detect,
prevent and remove malware.
B. Tick (√) the correct answer.
1. The action
which a virus performs on the computer is called…payload……
2.
Data backup
is said to be best prevention for data loss.
3. A malicious
software or a program that is developed for the purpose of harming the computer
system:
d. All the options
4. A
person who tries to break into people’s computer systems:
C. Hacker
5. A
program or file that a user allows or invites into his or her system:
D. Spyware
C. State True or False
1.
Data backup
is process of keeping a duplicate copy of the original files. TRUE
2.
Worm
infects files with .exe, .com, .sys file extensions. FALSE
3.
The full
form of VIRUS is Vital Information Resources Under Seize. TRUE
4.
It is not
recommended to update the computer with the latest version of antivirus. FALSE
5.
Common method
for a worm to enter the computer is through an email. TRUE
D. Answer the following questions.
1. What is
malware? What does it do?
Ans1.
Malware is a malicious software or a program that is developed for the purpose
of harming the computer system. Malware includes computer viruses, worms,
Trojan horses and spyware.
2. Compare
virus and worm
Ans2.
Virus-
1.
A piece of code that attaches to an existing program or file.
2.
It requires user action to run and infect other files.
3.
Virus spreads through infected file sharing, downloads, and
email attachments.
Worm-
1.
A standalone, self-sufficient program.
2.
Worm self-replicates and spreads automatically.
3.
Worm spreads rapidly across networks via network connections,
email, and instant messaging.
3. Define payload. Give
three payloads of virus infection.
Ans3. The action which the
virus performs on the computer is called payload. The different effects of
payload are:
1.
Deletion of files
2.
Formatting of the hard drive
3.
Degradation of performance
Q4. List advantages of antivirus software.
Ans4. Following are the advantages of antivirus
software:-
1. Protection against malware – Detects and removes
viruses, worms, trojans, spyware, ransomware, and other malicious software.
2. Safe browsing – Warns against or blocks
access to unsafe websites, phishing pages, and malicious downloads.
3. Email protection – Scans attachments and
links in emails to prevent infection through phishing or malicious content.
Q5. What precautions should be
taken to protect a computer from malware?
Ans5. key precautions to protect a computer from malware
are as follows-
1.
Install and Update Antivirus
Software
2.
Keep Operating
System and Software Updated
3.
Use a Firewall
4.
Be Cautious with
Emails and Attachments
5.
Avoid Downloading from Untrusted Sources
Comments
Post a Comment