Monday, May 3, 2021

Class -7 computer Chapter-2 Solved

Chapter-2

Q.1 In 1980s, with intention a virus was designed?

Ans. A virus was designed which caused all the character on the screen to drop at the bottom of the display.

Q.2 How can you define a computer virus?

Ans. A computer virus is a program or set of programs, designed in a way to spread from one computer to another to affect the normal functioning of a computer.

B. Long Question.

Q.1 How can we remove a computer virus?

Ans. We can remove a computer virus by Antivirus software. We can buy Antivirus software from computer store or download from the internet.

Q.2 Write the five steps to keep a computer safe from a virus.

Ans.       Step.1 Do not use any pirated software.

                2. We should not download unknown software of low quality software available as ‘Freeware’ on internet.

                3. Never open any e-mail from unidentified senders.

                4. To be double safe, scan everything that we want to download.

                5. We should back up our regularly and store back ups at separate place so that we can recover our data with clean virus free copies.

Q.3 What is spyware?

Ans. It gathers information about a particular user or organization without its knowledge.

Q.4 “All the viruses behave differently ‘ Comment on this statement.

Ans. Although every computer virus is not harmful but most of them leave a harmful effects on a computer system. The actual effect of any virus depends on how it was programmed by the creator of the virus program.

C. Tick () mark the correct option.

1. The present age belongs to

Ans. c. Information Technology

2. Which anti-virus is famous for high detention rate?

Ans. a. Kaspersky

3. The _______ programs perform unauthorized action on computers.

Ans. d. trojan

4. ________ software is used to remove computer virus.

Ans. b. anti-virus

D. Give the difference between.

1. Trojan and worm

Ans. Trojan : The Trojan program unauthorized action on computers. They can delete information on drives, make the system hang, steal confidential information etc. For example The PWSteal, Trojan

Worm: A worm exploits operating system to spread itself. The class was named for the way the worms move from computer to computer using networks and e-mails.

E.  Fill in the blanks

1.       We can take help of many anti-virus programs to remove viruses.

2.       We should not download unknown software of low quality software are available as free wall on internet.

3.       It does not appear on a computer by it can make copies of itself.

4.       A worm mainly exploits operating systems to spread itself.

5.       We must keep our regularly up-to-date.

   F. Jumbled words.

1. TNONRA  - Norton                                      2. SYTESM – System

3. ACMEEf – Mcafee                                       4. EPRKYSKAS - Kaspersky

No comments:

Post a Comment