Computer Security Class Vii
Computer Security Class Vii
KV BARGARH-CLASS-VII Page 1
COMPUTER SECURITY
No.1. What do you mean by threats to computer?
I. Hacking Attack.
II. Malware Attack( Malicious Software- Malware)
III. Phishing Attack
IV. Spamming
V. Trojan Horse Attack
VI. Spyware Attack
VII. Virus Attack (Vital Information and Resources Under Seize)
Ans. VIRUS stands for Vital Information and Resources Under Seize. A
Computer Virus is a program or software written by a computer
programmer for destructive purpose. Virus enters and destroys the
data of the computer without the permission of the user. Virus can be
mainly classified into 3 types:-
KV BARGARH-CLASS-VII Page 2
No.3. Describe Boot Sector Virus.
Ans. The Boot Sector Virus affects the index file or MBR (Master Boot
Record) which is mainly responsible for loading of Operating
System. It becomes active during the starting of computer or
booting of computer. Examples- Disk Killer, Stone Virus etc
Ans. The Program File Virus infects the executable file or programs
which has extension name like .com, .exe, .sys, .dll etc. Examples -
Sunday Virus, Cascade Virus
Ans. Macro Virus is a special program or code which mainly infects the
MS-Word, MS PowerPoint, MS Excel and also corrupts other MS-Office
files. These are also known as VBS (Visual Basic Script) Virus.
KV BARGARH-CLASS-VII Page 3
No.7. Describe Cyber law and its importance
Ans. The word Cyber means the use of Internet Technologies and
computers including computer networks, software, Data storage
devices, websites, email accounts etc. To protect Cybercrime, law is
passed and approved by the government. Cyber law mainly includes the
use of Electronic and Digital Signature and other Data Protection and
Privacy feature during electronic transaction.
Ans. The use of computer and its network to commit any computer
related crime is known as Cybercrime. In some cases the computer may
be used to commit the crime and in other cases the computer may
have been the target of crime. Some of the examples of Cybercrime
are:-
1. Hacking.
2. Information Theft.
3. E-mail Bombing (Spamming).
4. Salami Attack.
5. DOS (Denial of Service) Attack.
6. Trojan Attack.
KV BARGARH-CLASS-VII Page 4
No.9. What is Computer Ethics and write examples of Ethics?
KV BARGARH-CLASS-VII Page 5
No.11. Who are the Hackers and also mention its type?
Ans. Ethical hackers are actually legal hackers and they are hired by top
IT Software firms to safeguard their data and electronic transactions.
They are actually licensed hackers who can easily track the loopholes
(weakness) of a website and rectify them to make the website free
from hacking. They are also known as ‘White Hat’ Hackers.
Ans. Black Hats are actually known as Crackers. They break the
computer security either for criminal gains or for their own personal
gain and revenge. They bye-pass internet security to steal passwords,
credit card information, collect personal information and destroy files.
They are also called as “unethical hackers”.
Ans. Data Backup refers to making additional copies of data so that this
additional copy may be used to restore the original data if it is lost or
destroyed accidently.
KV BARGARH-CLASS-VII Page 6
No.15. How do you backup your files in Windows?
1. Click the Start button , Click Control Panel, Click System and
Security, Open Backup and Restore by clicking Backup your
computer now.
2. If you've never used Windows Backup before, click Set up backup,
and then follow the steps in the wizard.
3. If you've created a backup before, you can manually create a new
backup by clicking- Back up now.
1. Click the Start button , Click Control Panel, Click System and
Security, Open Backup and Restore by clicking Backup your
computer now.
2. To restore the files, click Restore my files.
3. To restore the files of all users, click Restore all users' files. If
prompted for an administrator password or confirmation, type the
password or provide confirmation.
KV BARGARH-CLASS-VII Page 7