Page 83 - Code Craft Computer-7
P. 83
5. A ______________ is a program very similar to a virus.
a. Spyware b. Worm
4. a b c d
c. Macro d. Boot Sector
B. Gap-fill exercise.
1. ______________ and data have become the lifeline of any organisation.
2. A ______________ has the ability to self-replicate itself and can lead to negative effects on your
system.
3. Norton is an example of ______________ .
4. ______________ can spread through e-mail attachments, discs, networks etc.
5. Melissa is an example of ______________ .
C. True and False assessment.
1. VIRUS stands for Vital Information Resources Under Seize.
2. All virus programs cause harm to data or programs.
3. Trojan Horses are self-replicating.
4. We should not equip our computer with anti-virus programs.
5. Virus can enter our computer through an infected pen drive.
D. Give appropriate responses to the questions.
1. What is a computer virus? Name its types.
2. Write any six possible symptoms of virus in a computer.
3. Define spyware.
4. Write any three ways that can help preventing a virus infection.
5. What do you mean by Antivirus Software?
Stretch Your Mind #Problem Solving
Check if there is any antivirus software installed in your computer. If yes, check if there is any
virus present in your computer. If not, download any from the internet and install it.
Join the Discussion #Communication
Work in pairs of four and discuss your views about the precautions that should be taken while
opening any new software on the internet or any new mail in your mailbox.
Mental Processing #Life Skills and Values
If you have used your pen drive on someone else's computer, will you use it on your laptop or
PC without scanning it? Why?
Teacher’s Corner
Make the students aware about different kinds of viruses and how they affect our computer's
functioning. Tell them about the ill effects of these viruses.
83

