Download Math 30 SQPs pdf
To protect data and important information, unique Passwords and Pin Numbers are given to every user.
A computer Virus is a program or a set of programs that disrupts the normal functioning of a computer.
A Worm is similar to a virus in design and considered to be a subclass of a virus.
Crackers are technical people who are experts in breaking into systems.
Unwanted bulk e-mails that come from strange sources are called Spam.
Trojan comes in two parts, a Client and a Server part.
A Spammer is a person who creates electronic spam and sends them out in large quantities, to flood the Internet.
Key Loggers program is used to check users' keystrokes and get important information like passwords.
Decryption is a process which converts the encrypted information to readable again.
White Hat in internet terminology refers to an ethical hacker who breaks the security for non-malicious reasons.
Virus infects or destroys data. (True)
Blaster worm allows malicious users to control a computer remotely. (True)
A Trojan Horse is a virus that is often disguised as a useful computer program. (True)
Malware is a generic term for useful software. (False)
Norton is a kind of virus. (False)
Spyware can gather information about passwords, e-mail addresses and even credit card numbers. (True)
Hard disk is a commonly used storage media. (True)
Hacking, which is done for good purposes is known as ethical hacking. (True)
We can safeguard our computers from unauthorized access by using passwords. (True)
Data backup basically means retrieving back lost and inaccessible data. (False)
VIRUS stands for c. Vital Information Resources Under Seize.
c. Stone virus is an example of the Boot virus.
Hacking a web server or taking control of another person's website is called c. Web hijacking.
c. Ankit Fadia is a renowned ethical Hacker from India.
A software program which secretly monitors the user's computing is called a c. Spyware.
McAfee is an example of b. Antivirus.
Highly technical people who break into computers to steal or destroy important data are called c. Hackers.
The process of making duplicate copies of data, which can be used to restore and recover data is called b. Backup.
Write the name of the process, that keeps sending bulk mails till the server gets full. (Mail Bombing)
Write the name of the virus, which is difficult to be detected by antivirus software as it uses various methods to avoid detection. (Stealth virus)
Who wrote the first computer virus called Elk Cloner? (Richard Skrenta)
Write the name of the software that protects a server, a network or an individual PC from almost every attack by viruses ad hackers. (Firewall)
Write the name of the process, that can be used to restore the original data in case of any data loss event. (Online Backup System)
Name the process the process that transforms data into an unreadable code. (Encryption)
What is a virus? Write its types.
Answer:
A virus is a program that disrupts the normal functioning of a computer. It destroys the data. It enters into a computer without the knowledge of the user. The full form of VIRUS is Vital Information Resources Under Seize. Viruses can be classified into two types, Boot Viruses, and Program File Viruses.
What is the function of Antivirus software?
Answer:
Antivirus software are computer programs, that are designed to identify, prevent and remove viruses from a computer. They perform the following tasks on a computer:
Scan the computer files to look for known viruses from the virus dictionary.
Identify suspicious behaviour from any computer program, which might indicate infection.
Scan the incoming e-mails, which might contain a virus in the attachment.
Some examples of Antivirus software are:
McAfee
Symantec Norton Antivirus
Microsoft Security Essential
AVG Antivirus
Quick Heal
What is a firewall?
Answer:
Firewalls are software or hardware tools that protect a server, a network or an individual PC from almost every attack by viruses and hackers.
Firewalls
Define Spam.
Answer:
Spam are unwanted bulk e-mails that come from strange sources. Spam are generally sent in a large number for commercial advertising.
Compare hackers and crackers.
Answer:
Hackers:
Hackers are highly technical people who secretly break into computers to steal important data or sometimes to destroy it. Hackers not only steal important data but also hack applications and websites to change the program logic.
Crackers:
Crackers are technical people who are experts in breaking into systems, to steal important data such as financial details, or passwords etc.
Define Recovery utilities.
Answer:
To restore data from logical damage, specialized disk-imaging utilities are used. These utilities recover every readable bit from the surface and also recover the logical file structure of storage media. After a hardware repair, these utilities play a very important role to get back the original data. E.g., PhotoRec, Recuva, and Adroit Photo Recovery.
What are the various security provisions in E-commerce?
Answer:
Nowadays, we are relying on E-commerce for most of our financial transactions. We should be highly concerned about the security in E-commerce. Systems using E-commerce have made some provisions regarding security.
Privacy(Using Encryption)
Passwords and Pin Numbers
Firewalls
What do you understand by the term Worm?
Answer:
A Worm is similar to a virus in design and is considered to be a sub-class of a virus. A Worm spreads from one computer to another computer, but unlike a virus, it has the capability to travel without any human action. The biggest danger with a worm is its capability to replicate itself on a system.
Describe the term Trojan Horse.
Answer:
A Trojan Horse is full of trickery as its name reflects. At first glance, the Trojan horse will appear to be useful software but will damage the computer once it is installed. Users on the receiving end of a Trojan horse are usually tricked into opening them because they appear to be receiving useful software or files from a genuine source.
List the problems that can be caused by a virus in a computer.
Answer:
Decreasing the speed of a computer by decreasing the memory.
Causing strange movements or patterns on the screen.
Showing abnormal write protect error.
Deleting or damaging files.
Frequent hanging of the system.
What do you understand by Data backup? Explain any two techniques of Data backup.
Answer:
In computer terminology, backup is the process of making duplicate copies of data, which can be used to restore the original data in case of any data loss event. These additional copies are called "backups".
Backups are helpful in two ways:
To restore data after any disaster (called disaster recovery).
To restore a small number of files that have been accidentally deleted or corrupted.