0% found this document useful (0 votes)
34 views

Class-6-Computer Ch-7- Answer Key

The document provides an answer key for Chapter 7 on Cyber Security, including definitions and explanations of terms like malware, cyber threats, and viruses. It contains various exercises such as fill-in-the-blanks, true/false questions, and matching activities related to cybersecurity concepts. Additionally, it outlines preventive measures against virus attacks and describes the function of cookies in web browsing.

Uploaded by

chalabhukan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views

Class-6-Computer Ch-7- Answer Key

The document provides an answer key for Chapter 7 on Cyber Security, including definitions and explanations of terms like malware, cyber threats, and viruses. It contains various exercises such as fill-in-the-blanks, true/false questions, and matching activities related to cybersecurity concepts. Additionally, it outlines preventive measures against virus attacks and describes the function of cookies in web browsing.

Uploaded by

chalabhukan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Answer Key

IT Elements - 6
Chapter 7: Cyber Security
Let’s Review (Pg. 102)
Answer in one word.
1. Virus 2. Melissa (This answer may vary.)
3. Polymorphic virus 4. Trojan horse
Exercises (Pgs. 107–109)
A. Tick (✓) the correct answers.
1. b 2. c 3. b 4. a 5. c
B. Fill in the blanks.
1. malware 2. Multipartite 3. Spam 4. anti-malware 5. biometric
C. Write ‘T’ for True and ‘F’ for False.
1. T 2. F 3. F 4. F 5. T
D. Answer the following questions.
1. The term ‘Cyber’ means computer or Internet and threat means danger or harm. Digital data
on a computer or Internet is prone to many risks. These risks are known as cyber threats.
Cyber threat refers to the malicious attempt to damage or disrupt a computer network or
system, stealing someone’s intellectual property, identity or money. Malwares, such as Worms,
Virus, and Trojans are some examples of cyber threats.
2. The term Malware is a combination of two words — malicious and software. Malicious means
harmful and software means program. Hence, malware refers to various kinds of harmful,
unsolicited or intrusive software that are written and developed to create mischief or hurt
the users.
A malware can enter the computer system in many ways. Some of the ways are as follows:
³³ Through email attachments
³³ By downloading or installing any file or software online
³³ Through links via instant messaging platform
3. Virus stands for Vital Information Resource Under Seize. A computer virus is a malicious
program or a piece of code that enters into a computer without the knowledge of the end user.
A computer virus performs specific functions which are mostly destructive in nature. It infects
computers, servers, websites, and software.
To prevent a virus attack, following steps should be followed.
³³ Install effective and advanced antivirus software.
³³ Scan the computer from time to time.
³³ Update the antivirus programs regularly in order to gain knowledge about the latest threats.
³³ It is a good practice to scan a pen drive before transmitting data.
³³ Prefer to install only registered copy of software and avoid installing pirated software.
4. Encryption is a technique used to convert plaintext or other digital data from a readable form
to an encoded version. The plaintext is known as unencrypted data, which is encrypted using
an encryption algorithm and an encryption key.
5. A cookie is a small file that is automatically sent by a website to the end user’s computer through
a web browser whenever it is connected to the same website. It stores the user’s specific data
as a text file. Cookies are generally stored for later use.
Ava’s Activity Zone (Pg. 109)
A. Rearrange the jumbled letters to form correct words.
1. MULTIPARTITE 2. POLYMORPHIC 3. STEALTH
4. SPYWARE
B. Match the following.
1. Program file virus a. Concept
2. Macro virus b. Disk Killer
3. Worms c. Sunday
4. Boot sector virus d. Mylife

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy