Class-6-Computer Ch-7- Answer Key
Class-6-Computer Ch-7- Answer Key
IT Elements - 6
Chapter 7: Cyber Security
Let’s Review (Pg. 102)
Answer in one word.
1. Virus 2. Melissa (This answer may vary.)
3. Polymorphic virus 4. Trojan horse
Exercises (Pgs. 107–109)
A. Tick (✓) the correct answers.
1. b 2. c 3. b 4. a 5. c
B. Fill in the blanks.
1. malware 2. Multipartite 3. Spam 4. anti-malware 5. biometric
C. Write ‘T’ for True and ‘F’ for False.
1. T 2. F 3. F 4. F 5. T
D. Answer the following questions.
1. The term ‘Cyber’ means computer or Internet and threat means danger or harm. Digital data
on a computer or Internet is prone to many risks. These risks are known as cyber threats.
Cyber threat refers to the malicious attempt to damage or disrupt a computer network or
system, stealing someone’s intellectual property, identity or money. Malwares, such as Worms,
Virus, and Trojans are some examples of cyber threats.
2. The term Malware is a combination of two words — malicious and software. Malicious means
harmful and software means program. Hence, malware refers to various kinds of harmful,
unsolicited or intrusive software that are written and developed to create mischief or hurt
the users.
A malware can enter the computer system in many ways. Some of the ways are as follows:
³³ Through email attachments
³³ By downloading or installing any file or software online
³³ Through links via instant messaging platform
3. Virus stands for Vital Information Resource Under Seize. A computer virus is a malicious
program or a piece of code that enters into a computer without the knowledge of the end user.
A computer virus performs specific functions which are mostly destructive in nature. It infects
computers, servers, websites, and software.
To prevent a virus attack, following steps should be followed.
³³ Install effective and advanced antivirus software.
³³ Scan the computer from time to time.
³³ Update the antivirus programs regularly in order to gain knowledge about the latest threats.
³³ It is a good practice to scan a pen drive before transmitting data.
³³ Prefer to install only registered copy of software and avoid installing pirated software.
4. Encryption is a technique used to convert plaintext or other digital data from a readable form
to an encoded version. The plaintext is known as unencrypted data, which is encrypted using
an encryption algorithm and an encryption key.
5. A cookie is a small file that is automatically sent by a website to the end user’s computer through
a web browser whenever it is connected to the same website. It stores the user’s specific data
as a text file. Cookies are generally stored for later use.
Ava’s Activity Zone (Pg. 109)
A. Rearrange the jumbled letters to form correct words.
1. MULTIPARTITE 2. POLYMORPHIC 3. STEALTH
4. SPYWARE
B. Match the following.
1. Program file virus a. Concept
2. Macro virus b. Disk Killer
3. Worms c. Sunday
4. Boot sector virus d. Mylife