We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4
Unit 6
1. Define Computer security
Computer security is used to protect computer system and data. It protects computer system from damage as well as anauthorized use. 2. Define Virus? A virus is a program that disturbs the normal working of the computer is called virus. It can delete some or all files on the computer system. 3. How can virus damage computer? A computer virus can damage data or software on the computer. It can delete some or all files on the computer system. It can destroy all data by formatting hard drive. It may display a political or false message. 4. List some causes of computer virus. Email Network Removable storage media Pirated software 5. What is pirated software The illegal copy of software is called pirated software. Virus can spread if the user installs pirated software that contains virus 6. How the virus is activated? When the computer virus starts working, it is called activation of virus. A virus normally runs all the time in the computer. Many viruses are activated on a certain data. 7. How can we protect the computer system from virus The latest antivirus should be installed on computer The antivirus must be regularly updated Unknown emails should not be opened The floppy disk must be scanned before use 8. Name different types of viruses? Different types of viruses are boot sector virus chernobal virus logic bomb Trojan horse 9. How dose Boot sector virus work? The disk is divided into tracks and sectors. The disk that contains operating system has a special program in its first sector. The sector is known as boot sector. The boot sector virus modifies the program in the boot sector. It is loaded into memory whenever computer is turned on. The virus is attached with the executable files like .exe, .com and .dll files. 10. Define Chernobal virus The famous chernobal virus deletes all Microsoft office files. It also deletes the partition information from the disk that causes a major loss of data. 11. Define Logic Bomb. Logic Bomb is a virus activates when certain conditions are met such as opening a file and when certain date and time occurs. Logic bomb is also called time bomb. 12. Define Trojan horse. Trojan horse itself hides itself a useful program. it contains hidden instructions to erase data and other damages. Format c is an example of Trojan horse. 13. What is Redlof? Redlof is a polymorphic virus. It is written in visual basic script. It relies on the Microsoft ActiveX component to execute itself. It locates folders. htt and infects that file. 14. What is antivirus software with example? A type of software used to detect and remove viruses is called anti virus’s software. It contains information about different viruses .It can detect viruses and remove them. For example McAfee, NOD32, AVAST, Norton 15. Write down some import antivirus McAfee, NOD32 AVAST Norton 16. Why data security is important The protection of data is called data security. The data is much valuable and important then the computer itself. It should be saved in such a way that it may not be lost or damaged. 17. What is Data Protection Data Protection is a process of hiding personal data from unauthorized persons. It means that the data belonging to a person should be hidden from other persons 18. Define Software Piracy? Software piracy is the illegal duplication of copy righted software. Virus can be spread if the user installs pirated software that contain virus. Software piracy is a punishable crime. 19. What is Privacy issue? Privacy issue means that individual has the right to see the data collected about him. He also has a right to submit an application to view data any time. 20. What is the purpose of copyright act? Copyright Act 1976 is the principal law that governs of software piracy. Software piracy is now a punishable crime. The punishment may involve huge amounts of penalties. 21. What are Password and its purpose? Password is secret word to protect a computer system or program. It may consist on numbers, alphabets or both. The user has to type the password to access the computer. The main purpose of password is to protect data from unauthorized use, lost and misused by any person. 22. Define backup and its purpose An additional copy of data or information stored on secondary storage media is called the backup. The backup can be used to recover deleted data that is being lost accidently .There are two types of backup. Complete backup Incremental backup 23. Define Hacker. Hacker is a person who accesses the computer network and its other resources illegally is called hacker. Hacker is expert in the field of computer. He has a technical knowledge. 24. Difference between Complete back and Incremental backup Back of all data on the hard disk is called complete backup. The advantage of this backup is that the entire hard disk is backed up. Incremental backup create a copy of only the data is newly created or modified since the last backup. This process is automatically performed in some software. 25. Define Biometric. Biometric is the use of Fingerprints, retina, facial feature sans or other measurements of individual body features. It can be used to identify any person by using personal characteristics. 26. Write any two ways in which security of data may be violated. Someone may break into the computer room. He may take away all storage devices that contain important data. An unauthorized user may take access to the personal data. He may use it gain some advantage