IT Planet Class 8 Computer Chapter 11 Solution – Computer Virus And Security Risk
IT Planet Class 8 Solution: IT Planet Class 8 Computer Chapter 11 Computer Virus And Security Risk all Question Answer Solution by Expert Computer Teacher. Here Students can here all Questions Accurate Answers of Chapter Computer Virus And Security Risk Solution.
Q1) Tick ( √ ) the correct answer :-
1) An illegal act involving Internet and online is referred to as a
Ans: ii) Cyber crime
2) The virus that gets activated every Friday that occurs on the 13th of a month is
Ans: iii) Jerusalem virus
3) A common type of virus that adds virus code to the regular programming code in a program file is
Ans: iii) File infector
4) A program that displays online advertisement in a banner and the web page.
Ans: i) Adware
5) A program that detects the changes caused by a virus in the computer is
Ans: i) Antivirus
Q2) Fill in the blanks :-
a) Any illegal act involving computer data is referred to as Computer crime
b) Hacker is referred to someone who gains access to computer programs or systems of others, without their permission.
c) Virus are programmed intentionally by a programmer known as Virus author
d) The most common way a virus enters a computer is through an attachment with an email
e) Trojan Horse virus comes as a friendly program
f) A Virus definition is a known specific pattern of virus code.
Q3) Answer the following questions :-
a) Solution:
It is the term that comes in relation with the harmful activities that is done to
computer hardwares, softwares, computer data and information or to a computer’s
processing capability. Some computer security can be broken by accidently or by planning (with intentionally or unintentionally).
i) Any illegal act involving computer data is referred to as Computer crime
ii) Hacker is referred to someone who gains access to computer programs or
systems of others, without their permission.
iii) An illegal act involving Internet and online is referred to as a Cyber crime.
b) Solution:
It is a program, which completely tampers, or infects/damages the program files
and folders available in the system, which as result creates a problem/slow in smooth
functioning of the system. Whenever we try to download any files from internet (malicious sites), or through pendrives, mails, the virus enters into the computer. When the host program is executed, the virus spreads very fast. The virus tries to multiply itself in the system when the virus enters in the system. There are some softwares/programs created to save the program files/folders from the system and guards it. This software is used for scanning the virus in the program/system and removing it thoroughly. There are some popular antivirus such as Net Protector Antivirus, Quick Heal, AVG etc. This programs are much effective against known viruses. The different types of viruses are as follows :-
i) Worm :- It a virus that harm the resources of the computer system and makes it
useless. They have the capability of getting transferred from one system to
another without any problem.
ii) Trojan Horse :- This virus acta as friendly relation with the games or application
and automatically gets installed in it. This virus is very dangerous and has the
ability to destroy all the data on the systems.
iii) File infector :- It is one of the virus and is common . this virus is been directly
added to the coding of the program. So there is a possibility that other
programmed files runs automatically if in case the infected program file is been
run.
iv) Boot sector virus :- This virus directly gets attacked to the booting sectors of the
disk. The boot sector is the place where the starting of booting and rebooting of
the computer takes place and the tables for file allocations are been kept. When
the disk is loaded/ booted, every time this is been readed and loaded into the
memory. This is also a very powerful virus.
v) Rootkit :- This is the virus program that itself gets hidden into the computer and
gives permission to the person at some remote location and take control of the
computer. Once the virus gets installed on the remote computer, the author of the
rootkit virus can execute the programs, change various settings, keep an eye on
the activities and can access the files form the remote computer. This virus can be
used for positive manner like for law enforcement in the legal activities but they
are mostly used for doing illegal activities.
vi) Spyware :- This program directly gets installed on the users computer or mobile
device without the permission or consent of the user. This program secrectly
collects the confidential / important information about the user and directly send
it to the other source when the user is online. All these things takes place without
the consent/knowledge of the user.
vii) Adware :- When you log on the internet you see some advertisements banner gets
displayed. You may also see the pop-up-windows or pop-under-windows on the
web page, email messages or on other internet services displaying the
advertisements.
c) Solution:
The computer gets infected through virus by different means which are :-
i) By opening an infected file.
ii) Running or using the infected file/program.
iii) Trying to start the computer by making use of virus infected CD or pen drive.
iv) By downloading any file from the internet.
d) Solution:
E-mail virus are the virus programs that are sent through the virus files are
attached to the e-mail messages. Nowadays, e-mail attachments are widely and
commonly used, so the e-mail viruses are also increased. If there is only text characters in the e-mail message, so we cant get infected by the e-mail viruses.
The way how the E-mail viruses gets spreaded
If you receive an e-mail message from the unknown source and you open it then the
virus gets installed in your computer system. And the same e-mail attached virus file
you send/forward unknowingly to the other person, then the virus is spreaded or
gets infected into that particular persons computer system. This virus automatically
access the e-mail address book and can send it directly to the e-mail addresses that
is been stored into the computer system.
e) Solution:
To prevent the computer from different virus attacks, the different methods are
as follows :-
i) Whatever the files are been stored into the computer system, must be kept back
up of it frequently.
ii) The files, information that comes from the unknown means/souse first it should
be checked by the antivirus program. Once it is been confirmed that the files/
information that is received form the unknown sources are virus free then the
user may open the file.
iii) To keep our computers free from virus attacks, one must gets antivirus program
installed into the computer. Some antiviruses comes preloaded with operating
systems or if not ten the user can purchase it from the market.
Q4) Application Based Question ;-
If Rohit’s computer has started to display text in different sizes automatically. That
means his computer is been infected by the virus. I will ask him to install the antivirus
software into the computer which will scan for the computer virus and can clear it.