Page 45 - Viva ICSE Computer Studies 7 : E-book
P. 45

A.  Fill in the blanks.

                         1.  A disk or hard drive consists of smaller sections known as _______________.
                         2. _______________ is a virus but looks like an antivirus program.
                         3.  Antivirus programs check the fi les on your computer to ______________ the viruses and also
                             ______________ them.
                         4.  A virus database needs to be ____________ frequently to identify new virus _____________.
                         5. _______________ scans the entire system.

                    B.  State whether the following statements are true or false.

                         1.  Installing antivirus software does not assure a 100% protection.               __________
                         2.  Virus cannot be separated from the data fi le.                                 __________
                         3.  It is important to create a backup of the imported fi les every day.           __________
                         4.  We should scan the hard disk within a week.                                    __________
                         5.  Spyware is designed to collect information and data on users and
                             observe their activity without their knowledge.                                __________

                    C.  Choose the correct answer.

                         1.  Which of the following is true for spyware?
                             (a)  It is referred to as tracking software.
                             (b)  It tricks the user by acting as an original fi le.
                             (c)  It takes advantage of security weaknesses to replicate.
                             (d)  It creates fake malware fi les in the computer.
                         2.  Stone virus is an example of _____________________________ virus.
                            (a)  worm               (b) program fi le      (c) boot sector        (d) network

                         3.  Which of the following is not true for Marburg?
                             (a)  It appears in diff erent forms.
                             (b)  It changes the location of the infected fi le.
                             (c)  It changes binary pattern of the infected fi le.
                             (d)  It infects a fi le.
                         4. ______________ infects a computer in a network and then moves on to the next, and the
                             cycle keeps on repeating.
                            (a)  Elkern             (b) Michelangelo       (c) MSBlast            (d) SQL Scanner

                         5.  Which of the following is true for Dir-2?
                             (a)  It is designed to change the location of the infected fi le.
                             (b)  It enters the system through a network.
                             (c)  It creates a copy of itself.
                             (d)  It appears in diff erent forms.




                                                                                                                    33
   40   41   42   43   44   45   46   47   48   49   50