[go: up one dir, main page]

0% found this document useful (0 votes)
74 views3 pages

CH-2 Computer Virus

The document provides an overview of computer viruses, including types, effects, and prevention methods. It includes multiple-choice questions, true/false statements, and fill-in-the-blank exercises related to viruses, adware, and spyware. Additionally, it explains the function of antivirus programs and the importance of virus signatures.

Uploaded by

mitalmavani30
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views3 pages

CH-2 Computer Virus

The document provides an overview of computer viruses, including types, effects, and prevention methods. It includes multiple-choice questions, true/false statements, and fill-in-the-blank exercises related to viruses, adware, and spyware. Additionally, it explains the function of antivirus programs and the importance of virus signatures.

Uploaded by

mitalmavani30
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Chapter 1 -Computer virus

A. Tick the correct answer


1. _________gets activated every Friday which occurs on the 13th of a month,
a. Trojan Horse
b. File infector
c. Jerusalem Virus
2. __________virus adds virus code to the regular programming code in a program
file.
a. File infector
b. Boot sector
c. Worm
3. ___________is a program that displays online advertisement in a banner on the
web page.
a. Worm
b. Trojan horse
c. Adware

4. A ___________is a destructive event the malware is intended to deliver


a. Payload
b. Download
c. Temp file
5. __________program detects the changes caused by a virus in the computer
a. Virus detector
b. Anti Virus
c. E-mail

B. Write true or False


1. Virus can damage or destroy the operating system- True
2. Boot sector virus is a harmless virus program-False
3. The Sleeper virus is known to steal your personal and financial information-True
1
4. Viruses get activated by downloading an infected file from the internet.-True
5. We should ignore new virus alerts and virus hoaxes while using internet- False.

C. Fill in the blanks


1. Viruses are programmed intentionally by a programmer known as virus author.
2. A virus enters a computer through an attachment with an email.
3. Trojan horse virus comes as a friendly program.
4. A virus definition is a known specific pattern of virus code.
5. A virus hoax warns users of a non- existent virus or malware.

D. Differentiate between Adware and Spyware


Adware is a program that displays unwanted advertisements in a banner, popup
window on web pages, email messages on internet services.

Spyware is a program that secretly collects information about the user and then
communicates the same to outside sources while the user is online.
E. Answer in one or two sentences:
1. What is computer virus?
Computer Viruses are programs which are created deliberately to damage
critical information and data thereby badly affecting the working of a computer.

2. Why do we use anti-virus program?


An Antivirus program protects a computer against virus, identifying and
removing any computer virus found in the memory, storage media or files.

3. What do you understand by virus signature?


Antivirus programs use virus signatures as one of their techniques for detecting
viruses. A virus signatures is also called a virus definition, is a known specific
pattern of virus code.

F. Answer Briefly
2
1. What is Boot sector Virus?

Boot sector virus attaches itself to the boot sector of the disk where start-up
instruction and the File allocation Table are kept. This sector is read and loaded into
the memory every time the disk is booted. If Boot sector is infected, it affects the
booting of a computer and is evidently very dangerous.

2. How does e-mail virus spread?

When you open an e-mail attachment that contains the virus, the Email virus spreads
to your computer. If you forward that attachment to others and they open the
attachment, their computer too gets infected.

3. What is ransomware?
Ransomware is a virus that restricts the access to your system and demands a ransom
(money) to be paid in order to remove the restrictions.

4. Write any two precautions that should be taken to prevent computer Virus.

1. Install an anti-virus program and update operating system, and virus


signature files regularly.

2. Never open emails attachments unless from a trusted source and never
download information from unknown sites.

G. Application-based Question

Ans: The e-mail attachment might have a virus in it that made the computer slow and
created trouble in running apps.

You might also like