Computer Virus and Security Risk Class 8 MCQ: CBSE Board Class 8 Computer MCQ Questions and Answers with elaborate explanation. Students get here all Important MCQ on Computer Virus and Security Risk Class 8.
Computer Virus and Security Risk Class 8 MCQ with Answers and Explanations:
1.) The event or an action that could be harmful for a computer hardware, software, data information or processing capability.
a) Computer Security risk b) Trading risk c) Intelligence risk d) None of these
Explanation :-It is the term that comes in relation with the harmful activities that is done to computer hardwares, softwares, computer data and information or to a computer’s processing capability. Some computer security can be broken by accidently or by planning (with intentionally or unintentionally).
i) Any illegal act involving computer data is referred to as Computer crime
ii) Hacker is referred to someone who gains access to computer programs or systems of others, without their permission.
iii.) An illegal act involving Internet and online is referred to as a Cyber crime.
2.) The person who gains access to computer programs or systems of others
a) User b) Programmer c) Hacker d) Youtuber
Explanation :-Hacker is referred to someone who gains access to computer programs or systems of others, without their permission. Hacker is the person for does not work for any company or do any type of job, but he is much expert in dealing with computer security and the network system.
3.) The program, which completely tampers, or infects/damages the program files and folders available in the system, which as result creates a problem/slow in smooth functioning of the system.
a) Hacking b) Virus c) Infection d) None of these
Explanation :-Computer virus is a program, which completely tampers, or infects/damages the program files and folders available in the system, which as result creates a problem/slow in smooth functioning of the system. Whenever we try to download any files from internet (malicious sites), or through pendrives, mails, the virus enters into the computer. When the host program is executed, the virus spreads very fast. The virus tries to multiply itself in the system when the virus enters in the system. There are some softwares/programs created to save the program files/folders from the system and guards it. This software is used for scanning the virus in the program/system and removing it thoroughly. There are some popular antivirus such as Net Protector Antivirus, Quick Heal, AVG etc. This programs are much effective against known viruses. Virus stands for Vital Information Resources Under Seize.
4) The another name of the Friday, 13th Virus is
a) Weekend Virus b) Dated Virus c) Jerusalem Virus d) None of these
Explanation :-It is the virus which is harmless but displays only a message on the computer screen. Virus gets attached to the programs and moves from disk to disk by infecting or destroying the data. This type of virus gets active on specific date or event. This type of virus is called as Friday, 13th Virus ( this virus gets activated on every Friday of the month that falls on 13th date ) and is well known by the other name Jerusalem ( in the year 1987,it was been discovered for the first in the University of Jerusalem ).
5.) The person who programs the virus is called as
a) Virus developer b) virus creator c) virus author d) virus maker
Explanation :-The person or the programmer who creates or programs the virus is called as Virus author. The virus is not created non-intentionally but with intentionally.
6.) The virus that harm the resources of the computer system and makes it useless.
a) Trojan horse b) Worm c) File infector d) Spyware
Explanation :-Worm is a virus that harm the resources of the computer system and makes it useless. They have the capability of getting transferred from one system to another without any problem.
7.) This virus is very dangerous and has the ability of destroying the whole data on the systems.
a) File infector b) Spyware c) Trojan Horse d) Adware
Explanation :-Trojan Horse virus act as friendly relation with the games or application and automatically gets installed in it. This virus is very dangerous and has the ability to destroy all the data on the systems.
8.) The virus that gets attached to the boot-sector of the hard disk.
a) Boot sector b) Rootkit c) Spyware d) Adware
Explanation :- Boot-sector virus is the virus directly gets attacked to the booting sectors of the disk. The boot sector is the place where the starting of booting and rebooting of the computer takes place and the tables for file allocations are been kept. When the disk is loaded/ booted, every time this is been readed and loaded into the memory. This is also a very powerful virus.
9.) It is the virus that gets added to the program coding.
a) Rootkit b) File infector c) Adware d) Spyware
Explanation :-File infector is one of the virus and is common . this virus is been directly added to the coding of the program. So there is a possibility that other programmed files runs automatically if in case the infected program file is been run.
10) When you log on the internet you see some advertisements banner gets displayed.
a) Rootkit b) Adware c) Spyware d) Hardware
Explanation :- Adware is when you log on the internet you see some advertisements banner gets displayed. You may also see the pop-up-windows or pop-under-windows on the web page, email messages or on other internet services displaying the advertisements.
11.) The program that hides in a computer and allows someone from the remote location to take full control of the computer.
a) Rootkit b) Hardware c) Spyware d) Adware
Explanation :- Rootkit is the virus program that itself gets hidden into the computer and gives permission to the person at some remote location and take control of the computer. Once the virus gets installed on the remote computer, the author of the rootkit virus can execute the programs, change various settings, keep an eye on the activities and can access the files form the remote computer. This virus can be used for positive manner like for law enforcement in the legal activities but they are mostly used for doing illegal activities.
11) The program that directly gets installed on the users computer or mobile device without the permission or consent of the user.
a) Spyware b) Hardware c) Software d) Adware
Explanation :- Spyware is the program directly gets installed on the users computer or mobile device without the permission or consent of the user. This program secretly collects the confidential / important information about the user and directly send it to the other source when the user is online. All these things takes place without the consent/knowledge of the user.
12) The viruses that gets spreaded by the e-mail messges.
a) Trojan horse b) e-mail c) Spyware d) Infected file
Explanation :-E-mail virus are the virus programs that are sent through the virus files are attached to the e-mail messages. Nowadays, e-mail attachments are widely and commonly used, so the e-mail viruses are also increased. If there is only text characters in the e-mail message, so we cant get infected by the e-mail viruses.
13.) A program that detects the changes caused by a virus in the computer is
a) Virus detector b) Antivirus
c) Virus trouble shooter d) None of these
Explanation :-Antivirus is software designed to detect the virus in our computer system and removes it from it to. Antivirus guards our computer from virus attacks. We can recover the files and protect our system from system failure. You can protect your computer from incoming virus threats, by making a update in the Antivirus software from the internet. You can not only scan and protect your computer system but also the external portable attached devices like pen drives etc. There are some Antivirus available in the market which are Quick Heal, Nortan, Avasti, AVG etc.
14.) The technique that is used for detecting the virus
a) Digital Signature b) Virus signature c) Verified signature d) None of these
Explanation :- The technique which is used for detecting the virus in the computer system is called as Virus signature. It is also called as the virus definition that is a specific pattern of code. If new virus is been discovered in this signature file pattern, for answering the files, it is much necessary for one to update the antivirus program.
15.) An illegal act involving Internet and online is referred to as
a) Computer crime b) virus c) Cyber crime d) All of these
Explanation :- In the computer terms, Cyber crime is an act that involves internet and online crimes. Cybercrime falls into the categories hacker, script, cracker, kiddie, corporate spy, unethical employee, cyber extortionist and cyber terrorist.