Chapter-2
Q.1 In 1980s, with intention a virus was designed?
Ans. A virus was designed which caused all the character on
the screen to drop at the bottom of the display.
Q.2 How can you define a computer virus?
Ans. A computer virus is a program or set of programs,
designed in a way to spread from one computer to another to affect the normal
functioning of a computer.
B. Long Question.
Q.1 How can we remove a computer virus?
Ans. We can remove a computer virus by Antivirus software.
We can buy Antivirus software from computer store or download from the
internet.
Q.2 Write the five steps to keep a computer safe from a
virus.
Ans. Step.1 Do
not use any pirated software.
2. We
should not download unknown software of low quality software available as
‘Freeware’ on internet.
3.
Never open any e-mail from unidentified senders.
4. To
be double safe, scan everything that we want to download.
5. We
should back up our regularly and store back ups at separate place so that we
can recover our data with clean virus free copies.
Q.3 What is spyware?
Ans. It gathers information about a particular user or
organization without its knowledge.
Q.4 “All the viruses
behave differently ‘ Comment on this statement.
Ans. Although every computer virus is not harmful but most
of them leave a harmful effects on a computer system. The actual effect of any
virus depends on how it was programmed by the creator of the virus program.
C. Tick () mark the correct option.
1. The present age belongs to
Ans. c. Information Technology
2. Which anti-virus is famous for high detention rate?
Ans. a. Kaspersky
3. The _______ programs perform unauthorized action on
computers.
Ans. d. trojan
4. ________ software is used to remove computer virus.
Ans. b. anti-virus
D. Give the difference between.
1. Trojan and worm
Ans. Trojan : The Trojan program unauthorized action on
computers. They can delete information on drives, make the system hang, steal
confidential information etc. For example The PWSteal, Trojan
Worm: A worm exploits operating system to spread itself. The
class was named for the way the worms move from computer to computer using
networks and e-mails.
E. Fill in the blanks
1.
We can take help of many anti-virus
programs to remove viruses.
2.
We should not download unknown software of low
quality software are available as free wall on internet.
3.
It does not appear on a computer by it can make copies
of itself.
4.
A worm mainly exploits operating systems
to spread itself.
5.
We must keep our regularly up-to-date.
F. Jumbled words.
1. TNONRA - Norton 2. SYTESM –
System
3. ACMEEf – Mcafee 4. EPRKYSKAS -
Kaspersky