Page 82 - Code Craft Computer-7
P. 82

8.  Try to use an ATM that is inside a bank or guarded 24 hrs by some bankguard. An unattended
                   ATM machine has high chances of having secret card cloners installed on it.

              9.  Avoid using pen drives with data at computers which you do not trust.

                   If you have to take data there, take formatted pen drive with only required data in it.
              10.  Finally, always install a legally purchased good antivirus on your computer. It will save you

                   from all spy and harmful programs.

                      Try It Out                                                                #Information Literacy



               Write down any three ways in which you can be hacked.
               ____________________________________________________________________________
               ____________________________________________________________________________
               ____________________________________________________________________________



                          Flashback Time

                    ¨  A computer virus is a program or a set of programs that is able to copy itself and becoming a
                       part of another program.
                    ¨  The full form of VIRUS is Vital Information Resources Under Seize.
                    ¨  Malware is a trouble-causing program. It may be a virus, worm, trojan horse or spyware.
                    ¨  Trojan Horse is a simple program that pretends to be a useful application whereas it always do
                       something destructive.
                    ¨  Spyware is a type of malware that covertly gathers user’s information through the user’s
                       internet connection without his/her knowledge.


                      Knowledge Check



            A.  Mark the correct response.
                                                                                                 OMR Sheet
                 1.  Which virus infects the boot record or master boot record?
                                                                                                 Use only blue/black ball
                      a.   Worm                               b.   Boot Sector                   pen to fill the circles. It
                                                                                                 should   be   darkened
                      c.   Spyware                            d.   Trojan Horse
                                                                                                 completely and properly.
                 2.  Sunday is an example of which type of viruses?                              Wrong methods
                      a.   Program File                       b.   Macro                         Correct method

                      c.   Boot Sector                        d.   Trojan Horse
                 3.  Which type of virus pretends to be a useful application?                    1.   a    b    c    d

                      a.   Trojan Horse                       b.   Boot Sector
                                                                                                 2.   a    b    c    d
                      c.   Worm                               d.   Spyware
                                                                                                 3.   a    b    c    d
                 4.  Antivirus either removes the virus or puts it in a ___________.
                      a.   Scan                               b.   Quarantine                    4.   a    b    c    d

                      c.   Recycle Bin                        d.   Dustbin
                                                                 82
   77   78   79   80   81   82   83   84   85   86   87