0% found this document useful (0 votes)
269 views

Computer Security Class Vii

Uploaded by

kvbsd13
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
269 views

Computer Security Class Vii

Uploaded by

kvbsd13
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

COMPUTER SECURITY

Sl. Units Contents


No
.
1 Computer 1.1 Threats to computer
Security 1.2 Virus and its types
1.3 Anti-Virus software and
examples
1.4 Firewall and its use
1.5 Cyber Crime and Computer
Ethics
1.6 Hackers and crackers
1.7 Cyber law and importance
1.8 Backup and Restore

KV BARGARH-CLASS-VII Page 1
COMPUTER SECURITY
No.1. What do you mean by threats to computer?

Ans. In computer Security, a threat is a possible danger that might


exploit (damage) the data stored inside a computer and thus causes a
threat or security breach (break). Some of the popular computer
threats are:-

I. Hacking Attack.
II. Malware Attack( Malicious Software- Malware)
III. Phishing Attack
IV. Spamming
V. Trojan Horse Attack
VI. Spyware Attack
VII. Virus Attack (Vital Information and Resources Under Seize)

No.2. What is a computer virus and mention its types?

Ans. VIRUS stands for Vital Information and Resources Under Seize. A
Computer Virus is a program or software written by a computer
programmer for destructive purpose. Virus enters and destroys the
data of the computer without the permission of the user. Virus can be
mainly classified into 3 types:-

I. BOOT Sector Virus.


II. Program File Virus.
III. Macro Virus.

KV BARGARH-CLASS-VII Page 2
No.3. Describe Boot Sector Virus.

Ans. The Boot Sector Virus affects the index file or MBR (Master Boot
Record) which is mainly responsible for loading of Operating
System. It becomes active during the starting of computer or
booting of computer. Examples- Disk Killer, Stone Virus etc

No.4. Write a note on Program File Virus.

Ans. The Program File Virus infects the executable file or programs
which has extension name like .com, .exe, .sys, .dll etc. Examples -
Sunday Virus, Cascade Virus

No.5. Write a note on Macro Virus.

Ans. Macro Virus is a special program or code which mainly infects the
MS-Word, MS PowerPoint, MS Excel and also corrupts other MS-Office
files. These are also known as VBS (Visual Basic Script) Virus.

No.6. What is Anti-Virus and write examples of it?

Ans. Anti-Virus is a specifically written utility program designed to trap


the virus codes and keep them secured or locked in a special folder
called as Quarantine. Some of the examples of Anti-Virus software are:-
Quick Heal, Kaspersky, Norton, PC-Clean, K7, Security Essentials,
Windows Defender etc.

KV BARGARH-CLASS-VII Page 3
No.7. Describe Cyber law and its importance

Ans. The word Cyber means the use of Internet Technologies and
computers including computer networks, software, Data storage
devices, websites, email accounts etc. To protect Cybercrime, law is
passed and approved by the government. Cyber law mainly includes the
use of Electronic and Digital Signature and other Data Protection and
Privacy feature during electronic transaction.

Importance- This law protects the Computer frauds and unauthorized


access in computer or network. It helps to prevent Spamming, Phishing
and Hacking. If any person found doing any kind of Internet or
Cybercrime, than he or she can be punished under Cyber law.

No.8. What is Cybercrime and write examples of it?

Ans. The use of computer and its network to commit any computer
related crime is known as Cybercrime. In some cases the computer may
be used to commit the crime and in other cases the computer may
have been the target of crime. Some of the examples of Cybercrime
are:-

1. Hacking.
2. Information Theft.
3. E-mail Bombing (Spamming).
4. Salami Attack.
5. DOS (Denial of Service) Attack.
6. Trojan Attack.

KV BARGARH-CLASS-VII Page 4
No.9. What is Computer Ethics and write examples of Ethics?

Ans. Ethics is a set of moral principles that govern the behavior of a


group or individuals. Computer Ethics is a set of moral values that
regulates the use of computer. Some of the examples of Computer
Ethics are:-

1. We must not use computer to harm others.


2. We must not steal any information or data from any computer.
3. We shall not use copy or use pirated software.
4. We must not offend others in any social media websites.
5. We must not threat or blackmail others in any social media
platforms.

No.10. What is Firewall and why it is used?

Ans. A Firewall is a part of a computer system or network that is


designed to block unauthorized access (without permission entry) and
only permits authorized access. A firewall can be Hardware or Software
or a combination of both. It is mainly used for accessing intranet
connected to internet. All the pharma companies and their employees
login through their intranet with internet connection and the
employees enter the details of sales, manufacture, doctor visit and
other information to boost up the sales, which others cannot view.

KV BARGARH-CLASS-VII Page 5
No.11. Who are the Hackers and also mention its type?

Ans. Hackers are expert computer programmers who take great


pleasure in solving computer problems. They can easily steal any data,
transfer money from one account to another or crash a computer
intentionally or knowingly. There are two types of Hackers:-

1. White Hats / Ethical Hacker.


2. Black Hats/ Crackers/Unethical Hackers.

No.12. Who is called an Ethical Hacker?

Ans. Ethical hackers are actually legal hackers and they are hired by top
IT Software firms to safeguard their data and electronic transactions.
They are actually licensed hackers who can easily track the loopholes
(weakness) of a website and rectify them to make the website free
from hacking. They are also known as ‘White Hat’ Hackers.

No.13. Who is known as Cracker?

Ans. Black Hats are actually known as Crackers. They break the
computer security either for criminal gains or for their own personal
gain and revenge. They bye-pass internet security to steal passwords,
credit card information, collect personal information and destroy files.
They are also called as “unethical hackers”.

No.14. What do you mean by Backup?

Ans. Data Backup refers to making additional copies of data so that this
additional copy may be used to restore the original data if it is lost or
destroyed accidently.

KV BARGARH-CLASS-VII Page 6
No.15. How do you backup your files in Windows?

Ans. To back up the files in Windows follow the steps:-

1. Click the Start button , Click Control Panel, Click System and
Security, Open Backup and Restore by clicking Backup your
computer now.
2. If you've never used Windows Backup before, click Set up backup,
and then follow the steps in the wizard.
3. If you've created a backup before, you can manually create a new
backup by clicking- Back up now.

No.16. What do you mean by Data Restore?

Ans. Data Restore refers to restore data from a removable storage


device or a system image backup to a computer.

No.15. How do you restore your files in Windows?

Ans. To back up the files in Windows follow the steps:-

1. Click the Start button , Click Control Panel, Click System and
Security, Open Backup and Restore by clicking Backup your
computer now.
2. To restore the files, click Restore my files.
3. To restore the files of all users, click Restore all users' files. If
prompted for an administrator password or confirmation, type the
password or provide confirmation.

KV BARGARH-CLASS-VII Page 7

You might also like