0% found this document useful (0 votes)
74 views3 pages

(Note: Question and Answers To Be Written in Notebook) : Chapter 3: Computer VIRUS

Chapter 3 discusses computer viruses, defining them as unauthorized programs that can harm computers. It outlines protective measures, symptoms of infection, and various forms of viruses, including malware and Trojans. Additionally, it describes antivirus software and its role in detecting and eliminating viruses.

Uploaded by

scratchcoder011
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views3 pages

(Note: Question and Answers To Be Written in Notebook) : Chapter 3: Computer VIRUS

Chapter 3 discusses computer viruses, defining them as unauthorized programs that can harm computers. It outlines protective measures, symptoms of infection, and various forms of viruses, including malware and Trojans. Additionally, it describes antivirus software and its role in detecting and eliminating viruses.

Uploaded by

scratchcoder011
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Chapter 3: Computer VIRUS

(Note: Question and Answers to be written in Notebook)


(Write the questions from text book for respective “Main” and write the answers below)

D. Answer the following questions.


ANS 1. A computer virus is a program, or a set of instructions loaded on someone’s
computer without their consent and runs against their wishes.

ANS 2: The following measures should be taken to protect against virus infection.
i) Install an antivirus software and update them regularly.
ii) Isolate the affected drives.
iii) Follow the basic rules while surfing on net. Do not open any unknown
attachment or click on any hyperlinks send from unknown sender.

ANS 3. The various symptoms of virus attack are


i. Computer may work slower than it was working previously.
ii. Computer freezes frequently or does not open properly.
iii. Computer restarts in every couple of minutes.
iv. The applications do not work properly.
v. Disks and drives cannot be reached.
vi. Unable to print
vii. Unexplained data loss
viii. Frequent computer crashes

ANS 4. The different forms of virus attack are Malware, Worm, Spyware, Trojan horse
and Sweeper.

ANS 5. Antivirus software are programs that identify and eliminate computer viruses.
These programs scan files based on the signature of the database of the known viruses
and once a virus is detected, it is deleted.

ANS 6. Some antivirus software are Kaspersky, Panda, Bitdefender, Norton and McAfee.
ANS 7.
a. Sweeper and Trojan Horse
• Sweeper - is a fake antivirus program also known as rogue.

• Trojan - A Trojan is a type of malware that is often disguised as a legitimate


software.

b. Spyware and Malware


• Spyware - is a type of malware that is installed on a computer without the
knowledge of the owner in order to collect the owner’s private information.

• Malware - is a software designed to disrupt, damage or gain authorized


access to a computer system.

ANS 8.
a. VIRUS - A computer virus is a program that can spread from host to host and
has the ability to replicate itself.

b. Worm - A computer worm is a standalone malware computer program. It is a


self-replicating computer program that penetrates an operating system with the
intent of spreading malicious code.

c. Trojan - A Trojan is similar to a virus but does not replicate itself.

d. Antivirus - Antivirus software are programs that can identify and eliminate
computer viruses.

e. Firewalls - Firewalls are software programs or hardware devices that filter the
traffic that flows into the PC or network through an internet connection.
(Note: Answers to be written in Textbook)
A. Choose the correct option.
1. Replicate itself
2. Vital Information Resource Under Seize
3. Macro Virus
4. Directory Virus
5. Do not open personal folder

B. Write T for True and F for False statements.


1. F
2. F
3. T
4. F
5. T

C. Fill in the blanks.


1. FAT Virus
2. Trojan
3. replicate
4. AntiVIRUS
5. Firewall

****************

You might also like