CLASS VIII CHAPTER 8 COMPUTER MALWARE

 

CLASS VIII

COMPUTER MALWARE



A.    Fill in the blanks with the help of the given words.

1.     SPYWARE.. is a program that is put in someone’s computer, to secretly gather information about the user and spread it to those with harmful intentions.

2.     ……VIRUS………….infects Microsoft Word or Microsoft applications that provide support for Macros (a sequence of steps).

3.     WORMS…………infect and multiply without targeting and infecting specific files already present on the computer.

4.     …HACKER….tries to break into your computer system to get information or destroy it.

5.     ANTIVIRUS………………software are used to detect, prevent and remove malware.

B.     Tick () the correct answer.

1.     The action which a virus performs on the computer is called…payload……

2.     Data backup is said to be best prevention for data loss.

3.     A malicious software or a program that is developed for the purpose of harming the computer system:

d. All the options

              4. A person who tries to break into people’s computer systems: 

                   C. Hacker

              5. A program or file that a user allows or invites into his or her system:

                   D. Spyware

        C. State True or False

1.     Data backup is process of keeping a duplicate copy of the original files.     TRUE

2.     Worm infects files with .exe, .com, .sys file extensions.                  FALSE

3.     The full form of VIRUS is Vital Information Resources Under Seize.   TRUE

4.     It is not recommended to update the computer with the latest version of antivirus. FALSE

5.     Common method for a worm to enter the computer is through an email.  TRUE

D.  Answer the following questions.

1. What is malware? What does it do?

Ans1. Malware is a malicious software or a program that is developed for the purpose of harming the computer system. Malware includes computer viruses, worms, Trojan horses and spyware.

 

2. Compare virus and worm

Ans2. Virus-

1.     A piece of code that attaches to an existing program or file.

2.     It requires user action to run and infect other files.

3.     Virus spreads through infected file sharing, downloads, and email attachments.

Worm-

1.   A standalone, self-sufficient program.

2.   Worm self-replicates and spreads automatically.

3.   Worm spreads rapidly across networks via network connections, email, and instant messaging.

3. Define payload. Give three payloads of virus infection.

Ans3. The action which the virus performs on the computer is called payload. The different effects of payload are:

1.   Deletion of files

2.   Formatting of the hard drive

3.   Degradation of performance

 

Q4. List advantages of antivirus software.

              Ans4.  Following are the advantages of antivirus software:-

1.     Protection against malware – Detects and removes viruses, worms, trojans, spyware, ransomware, and other malicious software.

2.     Safe browsing – Warns against or blocks access to unsafe websites, phishing pages, and malicious downloads.

3.     Email protection – Scans attachments and links in emails to prevent infection through phishing or malicious content.

             Q5. What precautions should be taken to protect a computer from malware?

            Ans5. key precautions to protect a computer from malware are as follows-

1.      Install and Update Antivirus Software

2.      Keep Operating System and Software Updated

3.      Use a Firewall

4.      Be Cautious with Emails and Attachments

5.      Avoid Downloading from Untrusted Sources

 

 

 

 

           

                   

 

 

Comments

Popular posts from this blog

CLASS 8 DATA TYPES IN PYTHON

CHAPTER 4 RAISING QUERIES CLASS 8 COMPUTER