0% found this document useful (0 votes)
168 views3 pages

Class 8 Chapter 4

Chapter 4 covers computer safety and security, including multiple-choice questions about antivirus software, data backup methods, and types of malware. It explains concepts like authentication, malware types, and the differences between viruses and worms, along with practical advice for maintaining computer health. The chapter also includes application-based questions to reinforce learning on security measures and data preservation.

Uploaded by

supriya2007.bh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
168 views3 pages

Class 8 Chapter 4

Chapter 4 covers computer safety and security, including multiple-choice questions about antivirus software, data backup methods, and types of malware. It explains concepts like authentication, malware types, and the differences between viruses and worms, along with practical advice for maintaining computer health. The chapter also includes application-based questions to reinforce learning on security measures and data preservation.

Uploaded by

supriya2007.bh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Chapter 4:

Computer Safety and Security Notes:-

1. Multiple Choice Questions (Tick ✓ the correct option)


a. Norton is a/an:
 (i) System Software
 (ii) Operating System
 (iii) Antivirus ✓
 (iv) All of these
b. You can backup your data into:
 (i) UPS
 (ii) External Hard Drive ✓
 (iii) Mouse
 (iv) None of these
c. _____ is a type of malware.
 (i) Encryption
 (ii) Trojan Horse ✓
 (iii) AVG
 (iv) None of these
2. Fill in the Blanks Using the Words Given Below
(Biometric, malware, encryption, decryption, zombie)
a. Malicious software is known as malware.
b. Recognition of biological characteristics is an example of biometric authentication.
c. Encryption is the process of converting data into a readable form.
d. Decryption is the opposite of encryption.
e. Zombie works in a similar way as the spyware.
3. Short Answer Type Questions
a. What is meant by authentication? What are the types of authentication?
Answer: Authentication is the process of verifying a user’s identity before granting him or her
access to a computer system.

Types of authentication include:


 Password-based authentication
 Biometric authentication (such as fingerprint or facial recognition)
 Two-factor authentication (2FA)
b. What is a Trojan?
Answer: Trojan horse is a type of malware. It conceals itself inside the software that seems
legitimate.
c. What is the use of an antivirus program?
Answer: An antivirus program is used to detect the presence of a virus on a computer and
remove
the virus.
4. Long Answer Type Questions
a. How will you keep your computer physically fit?
Answer:
 Regularly clean the computer components, such as the screen, keyboard, and mouse.
 Ensure proper ventilation around the computer to avoid overheating.
 Keep food and drinks away from the computer to prevent spills and damage.
 Check for loose connections and ensure all hardware is securely in place.
b. What is malware? How does it affect your computer? Mention some types of malware.
Answer:
 Malware is malicious software that harms or exploits a computer system.
 It can slow down the computer, steal data, delete files, or make the system inoperable.
 Types of malware include viruses, trojans, spyware, ransomware, and worms.
c. Differentiate between virus and worm.
Answer:
 A virus attaches itself to a legitimate program and spreads when the program is executed,
often causing damage to files or system functions.
 A worm is a standalone malware that replicates itself across networks without needing to
attach to a host program, causing network congestion or system overload.

Let’s Solve
1. Guess my name.
 a. My name resembles a micro organism. My prime motive is not to cause damage
but to clone myself on the host system.
Answer: Virus
 b. I specialize in concealing myself. Though, I belong to the cyber world, my name
has its roots in Greek mythology.
Answer: Trojan
 c. I do not collect information from the computer. I wait for the hacker to give me
commands.
Answer: Zombie
2. Application-based questions.
 a. Manisha wants to prevent other people from accessing her computer without
permission. Which security measure would help her in this situation?
Answer: Password protection
 b. Nitin is working on some important data. If he modifies the data, then he won’t be
able to use the original data. The original data would be required for future use.
What can he do with the data to make sure that the original data is preserved?
Answer: Take a backup of the original data.
 c. Anuj is working on his computer. Suddenly, the computer slows down, and some
unwanted files appear automatically. Help him to identify the problem with his
computer and suggest a way to resolve the problem.
Answer: His computer is infected by a virus. It can be resolved by installing antivirus
software like McAfee.

Additional Information
3. Concept-Based Questions:
 a. Question: Authentication is the process of verifying a user’s identity before
granting him or her access to a computer system. Types of authentication Are:
Password Protection, Biometric Authentication, etc.
Answer: Explanation provided in the question itself.
 b. Question: What is a Trojan horse?
Answer: A Trojan horse is a type of malware. It conceals itself inside software that
seems legitimate.
 c. Question: What is an antivirus program used for?
Answer: An antivirus program is used to detect the presence of a virus on a
computer and remove the virus.
 d. Question: List ways to physically clean your computer.
1. Cleaning the keyboard
2. Cleaning the mouse
3. Cleaning the monitor
Answer: The answer is in the list provided above.
 e. Question: What is malware, and what are its types?
Answer: Malware is malicious software designed to damage or carry out other
unwanted actions on a computer system. Types of malware include viruses, worms,
trojan horses, spyware, zombies, ransomware, rootkits, and backdoors.
 f. Question: What is the difference between a computer virus and a computer
worm?
Answer: A computer virus is a piece of code or program developed to corrupt data or
program files on a computer system. It enters the computer without the user’s permission,
and the user may not even realize that the computer is affected.
 A computer worm is a type of malware that can replicate itself without human
interaction. It consumes a lot of memory space in replication. Once a
computer is infected by a worm, its processing speed slows down, works
unexpectedly, and may halt other tasks.

You might also like