0% found this document useful (0 votes)
7 views4 pages

Unit 6

Uploaded by

rubeenayounas18
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views4 pages

Unit 6

Uploaded by

rubeenayounas18
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Unit 6

1. Define Computer security


Computer security is used to protect computer system and data. It
protects computer system from damage as well as anauthorized use.
2. Define Virus?
A virus is a program that disturbs the normal working of the computer is
called virus. It can delete some or all files on the computer system.
3. How can virus damage computer?
A computer virus can damage data or software on the computer. It can
delete some or all files on the computer system. It can destroy all data by
formatting hard drive. It may display a political or false message.
4. List some causes of computer virus.
 Email
 Network
 Removable storage media
 Pirated software
5. What is pirated software
The illegal copy of software is called pirated software. Virus can spread
if the user installs pirated software that contains virus
6. How the virus is activated?
When the computer virus starts working, it is called activation of virus.
A virus normally runs all the time in the computer. Many viruses are
activated on a certain data.
7. How can we protect the computer system from virus
 The latest antivirus should be installed on computer
 The antivirus must be regularly updated
 Unknown emails should not be opened
 The floppy disk must be scanned before use
8. Name different types of viruses?
Different types of viruses are
 boot sector virus
 chernobal virus
 logic bomb
 Trojan horse
9. How dose Boot sector virus work?
The disk is divided into tracks and sectors. The disk that contains
operating system has a special program in its first sector. The sector is
known as boot sector. The boot sector virus modifies the program in the
boot sector. It is loaded into memory whenever computer is turned on.
The virus is attached with the executable files like .exe, .com and .dll
files.
10. Define Chernobal virus
The famous chernobal virus deletes all Microsoft office files. It also
deletes the partition information from the disk that causes a major loss of
data.
11. Define Logic Bomb.
Logic Bomb is a virus activates when certain conditions are met such as
opening a file and when certain date and time occurs. Logic bomb is also
called time bomb.
12. Define Trojan horse.
Trojan horse itself hides itself a useful program. it contains hidden
instructions to erase data and other damages. Format c is an example of
Trojan horse.
13. What is Redlof?
Redlof is a polymorphic virus. It is written in visual basic script. It relies
on the Microsoft ActiveX component to execute itself. It locates folders.
htt and infects that file.
14. What is antivirus software with example?
A type of software used to detect and remove viruses is called anti
virus’s software. It contains information about different viruses .It can
detect viruses and remove them. For example McAfee, NOD32,
AVAST, Norton
15. Write down some import antivirus
 McAfee,
 NOD32
 AVAST
 Norton
16. Why data security is important
The protection of data is called data security. The data is much valuable
and important then the computer itself. It should be saved in such a way
that it may not be lost or damaged.
17. What is Data Protection
Data Protection is a process of hiding personal data from unauthorized
persons. It means that the data belonging to a person should be hidden
from other persons
18. Define Software Piracy?
Software piracy is the illegal duplication of copy righted software. Virus
can be spread if the user installs pirated software that contain virus.
Software piracy is a punishable crime.
19. What is Privacy issue?
Privacy issue means that individual has the right to see the data collected
about him. He also has a right to submit an application to view data any
time.
20. What is the purpose of copyright act?
Copyright Act 1976 is the principal law that governs of software piracy.
Software piracy is now a punishable crime. The punishment may involve
huge amounts of penalties.
21. What are Password and its purpose?
Password is secret word to protect a computer system or program. It may
consist on numbers, alphabets or both. The user has to type the password
to access the computer. The main purpose of password is to protect data
from unauthorized use, lost and misused by any person.
22. Define backup and its purpose
An additional copy of data or information stored on secondary storage
media is called the backup. The backup can be used to recover deleted
data that is being lost accidently .There are two types of backup.
 Complete backup
 Incremental backup
23. Define Hacker.
Hacker is a person who accesses the computer network and its other
resources illegally is called hacker. Hacker is expert in the field of
computer. He has a technical knowledge.
24. Difference between Complete back and Incremental backup
Back of all data on the hard disk is called complete backup. The
advantage of this backup is that the entire hard disk is backed up.
Incremental backup create a copy of only the data is newly created or
modified since the last backup. This process is automatically performed
in some software.
25. Define Biometric.
Biometric is the use of Fingerprints, retina, facial feature sans or other
measurements of individual body features. It can be used to identify any
person by using personal characteristics.
26. Write any two ways in which security of data may be violated.
 Someone may break into the computer room. He may take away all
storage devices that contain important data.
 An unauthorized user may take access to the personal data. He may
use it gain some advantage

You might also like